dayapp-mobile-push

Fail

Audited by Socket on Mar 9, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

The skill is broadly coherent with its stated purpose of sending a Day.app push notification based on task context and local configuration. It sensibly avoids complex credential management or binaries, and it performs a single GET request as described. However, there are notable data-flow considerations: task data is transmitted via URL query parameters, and device identifiers are read from a local config. This introduces potential URL-based data leakage and local credential exposure risks if logs or intermediaries capture the full URL. The design could be improved by ensuring HTTPS enforcement, minimal data in URLs, and, if possible, using a POST with a body or token-based authentication rather than sensitive information in query strings. Given these factors, the evaluation leans toward BENIGN with MEDIUM security risk due to possible data leakage in URL parameters.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 9, 2026, 09:08 PM
Package URL
pkg:socket/skills-sh/okwinds%2Fmiscellany%2Fdayapp-mobile-push%2F@b15c98beb8172ff5527a8e9ca12c4bbe3ef08add