score-and-tier
Audited by Socket on Apr 17, 2026
3 alerts found:
Anomalyx3This module appears to be a legitimate sign-up/verification helper that communicates only with a fixed OpenFunnel API domain and stores returned credentials locally as intended by the script’s comments. However, it carries moderate security/abuse risk due to sensitive API key persistence to a local .env file, fragile parsing of JSON responses using grep/cut, and unescaped JSON construction from user-controlled inputs (risk of malformed/manipulated payloads). No strong indicators of overt malware or supply-chain sabotage are present in this fragment, but the credential-handling and parsing approach should be reviewed and hardened (e.g., JSON escaping and a proper JSON parser) before use in security-sensitive environments.
No clear malware behavior is evident in this fragment (single fixed HTTPS destination, no persistence/backdoor/exfil beyond intended API authentication). The primary security risk is the use of `source` on a discovered `.env` file discovered via directory traversal, which can enable arbitrary command execution if the `.env` contents/location are attacker-controlled. METHOD/ENDPOINT are unvalidated and could cause unintended requests, but they do not appear to enable arbitrary host targeting in this snippet.
SUSPICIOUS. The skill’s business purpose and API actions are broadly coherent with OpenFunnel’s public product, and there is no sign of obvious exfiltration or malicious off-platform routing. However, trust depends on opaque local shell wrappers that collect auth inputs, store credentials in `.env`, and perform all API calls without visible implementation, so the install/execution trust and credential-forwarding model cannot be fully verified from the skill alone.