tushare-plugin-builder
Audited by Socket on Mar 9, 2026
1 alert found:
Obfuscated FileOverall, the skill outline is conceptually coherent: it describes a structured, end-to-end workflow to generate and validate a tushare-based plugin with extractor, service, schema, and config, plus validation scripts and agent integration. There are no explicit malicious behaviors or unverifiable binaries. The data flows and permissions are appropriate for a data ingestion/plugin framework, though real-world security depends on correct handling of credentials, proper parameterized queries, and secure exposure of HTTP/MCP endpoints. Given the absence of concrete code and explicit credential harvesting patterns, the approach is labeled as SUSPICIOUS to BENIGN in parts; the overall footprint appears aligned with the stated purpose, but concrete implementations must ensure strict credential handling, parameterized queries, and restricted data exposure to avoid elevated risk during deployment.