Resend Expert

Fail

Audited by Socket on Feb 20, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] hardcoded_secrets: Hardcoded API key detected (HS001) [AITech 8.2] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] No direct malicious code patterns (obfuscation, remote backdoor, eval-based code injection) were found. However, this skill/documentation contains a hard-coded API key and explicit verified sender/domain info. That is a significant security/privacy problem: if the key is valid it enables abuse (sending arbitrary emails, managing resources). The network endpoints used are official (api.resend.com), so there is no evidence of third-party interception, but the embedded credential and permissive allowed-tools increase the risk of misuse. Recommend removing or rotating the hard-coded key, treating the key as compromised, and avoiding publishing verified-sender claims in public examples. LLM verification: This file is documentation for the Resend API and SDKs and not executable malware. The primary, high-impact security issue is a cleartext hardcoded API key present in examples — if valid, it grants authenticated access to the Resend service and can be abused to send spam/phishing, manipulate contacts/domains, or create webhooks. Secondary issues: unpinned dependency installs and missing guidance on key scoping/rotation. Action: redact/remove the inline key, require use of environment variables f

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 20, 2026, 12:24 PM
Package URL
pkg:socket/skills-sh/willsigmon%2Fsigstack%2Fresend-expert%2F@e8ca66d7fb90fd6d26b61ba9055a0d32f03a77f8