implementing-google-workspace-admin-security

Fail

Audited by Socket on Mar 15, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
scripts/agent.py

This appears to be a legitimate administrative auditing tool for Google Workspace. I found no indicators of malicious intent or covert exfiltration — network interactions are limited to Google APIs, and there is no obfuscated or dynamic execution. The primary security concerns are operational: handling and protection of the service account JSON key and delegated admin identity, broad OAuth scopes granting powerful access, potential local exposure of sensitive PII via stdout or output files, and incomplete pagination/error handling which could cause missed events or unhandled exceptions. Recommendations: protect the key (use IAM restrictions, short-lived credentials or workload identity where possible), apply least-privilege scopes, sanitize/redact sensitive output or restrict file permissions when writing reports, add consistent pagination and error handling for API calls, and avoid delegating a super-admin unless required.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 15, 2026, 09:40 PM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fimplementing-google-workspace-admin-security%2F@7008f076479a4af47a4388918a332d5a5c026c43