twitter-poster

Fail

Audited by Socket on Feb 15, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

The skill's purpose and capabilities are reasonable for automated Twitter posting, but the document contains critical security issues: multiple plaintext OAuth credentials and bearer tokens and the inclusion of arbitrary shell access (Bash). These together create a high risk of credential theft, account takeover, and local secrets exfiltration. There is no direct evidence of obfuscated or actively malicious executable code in the file itself, but the combination of exposed credentials and excessive tooling is dangerous and should be treated as a supply-chain security incident until tokens are rotated and the spec is sanitized. Recommended immediate actions: rotate all exposed tokens, remove secrets from the repository, require secure secret injection (env vars/secrets manager), and remove or limit Bash access. Implementers should audit runtime behavior if these tokens were used.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 15, 2026, 09:18 PM
Package URL
pkg:socket/skills-sh/rkreddyp%2Finvestrecipes%2Ftwitter-poster%2F@c19f51a63044e151f8bc6b6f94358be2d9a80fa1