shopify-automation

Fail

Audited by Socket on Feb 27, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

The YAML describes a legitimate‑looking Shopify automation skill that intentionally routes all API access through a third‑party MCP (https://rube.app/mcp). The file itself is declarative and contains no hardcoded credentials or embedded executable code, so there is low evidence of intrinsic malware in the fragment. However, the architecture centralizes OAuth tokens and all Shopify traffic at the MCP, creating a material supply‑chain and data‑exposure risk: the MCP operator or a compromised MCP can read, persist, or modify sensitive data and act with granted privileges. Before deploying, verify the MCP operator's trustworthiness (privacy policy, retention, encryption, personnel controls), request least‑privilege OAuth scopes, require explicit per‑action confirmations for destructive operations, and prefer direct Shopify integrations if MCP trust cannot be established.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 27, 2026, 09:17 AM
Package URL
pkg:socket/skills-sh/sickn33%2Fantigravity-awesome-skills%2Fshopify-automation%2F@ba0f82e5bf963597c419a378b95c8dc44ba6af92