competitive-analysis
Audited by Socket on Mar 1, 2026
1 alert found:
SecurityThis skill is coherent with its stated purpose: it asks for internal product context, uses web browsing to capture competitor screenshots, and writes structured competitive analyses and assets to the workspace. There are no direct malicious indicators (no code-execution downloads, no hardcoded secrets, no known exfiltration endpoints). Primary security concerns are operational: granting automated browsing and write access to workspace files can expose confidential internal material or login-gated UIs, and using third-party image-generation APIs may leak initiative details. Treat the skill as generally safe for its purpose but apply platform safeguards: limit subagent reach, require per-URL approvals, and avoid sending sensitive content to external image-generation services.