pypi-doppler
Audited by Socket on Feb 28, 2026
1 alert found:
MalwareThe skill is coherent with its stated purpose (local-only PyPI publishing using Doppler) and does not contain clear malicious code. However it includes several supply-chain and operational risks: copying an agent/plugin script into a repository creates a transitive trust and could introduce malicious code if the plugin area is compromised; using `doppler secrets get --plain` prints secrets to stdout (risking leakage to logs or history); recommending broad-scope ('Entire account') PyPI tokens in a central Doppler project increases blast radius. Overall this is not confirmed malware, but it presents a medium security risk unless operators enforce least-privilege tokens, avoid printing secrets, and verify the copied script contents before execution.