linkedin-automation

Fail

Audited by Socket on Feb 27, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

Functionally, the module describes legitimate LinkedIn automation workflows and required call sequences. The primary security/supply-chain concern is the requirement to add and trust an external MCP (https://rube.app/mcp) which manages OAuth flows, tokens, and proxies LinkedIn API calls. That design centralizes credentials and runtime behavior outside the user's direct control, creating plausible exfiltration and impersonation risks if the MCP or its dynamically supplied tool schemas are compromised or malicious. No direct evidence of embedded malware, hardcoded secrets, or obfuscated code was found in the provided specification. Recommendations: verify MCP operator trustworthiness and auditing practices, prefer pinned/signed tool schemas or direct OAuth flows when possible, minimize OAuth scopes to least-privilege, and require per-action confirmation or fine-grained consent for publish/delete operations.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 27, 2026, 09:23 AM
Package URL
pkg:socket/skills-sh/sickn33%2Fantigravity-awesome-skills%2Flinkedin-automation%2F@da3c587bf1bce166d9ae2d326d0132d945a3fd64