plaid

Warn

Audited by Socket on Mar 1, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

The skill documentation for plaid-cli is internally consistent with its purpose: it requires Plaid credentials, stores tokens locally, and interacts with the Plaid API. I found no indicators of deliberate malicious behavior in the provided text (no obfuscation, no download-and-execute instructions, no third-party proxy endpoints). The primary security concerns are standard for API CLI tools: local storage of access tokens (~/.plaid-cli), a command that can print tokens to stdout (`plaid-cli tokens`), and relying on upstream GitHub code (supply-chain trust). Recommend ensuring strict file permissions for ~/.plaid-cli, avoiding use of commands that print secrets in automated contexts, and pinning/verifying the upstream release before installation.

Confidence: 75%Severity: 75%
Audit Metadata
Analyzed At
Mar 1, 2026, 05:16 AM
Package URL
pkg:socket/skills-sh/ThinkfleetAI%2Fthinkfleet-engine%2Fplaid%2F@1897082aaa8ebd446a0db1a8b29391a9468384ac