Audited by Socket on Feb 22, 2026
1 alert found:
Obfuscated FileThe package/skill appears to implement LinkedIn engagement features that match its documentation. I found no direct evidence of embedded malware, backdoor code, obfuscated payloads, or external downloader primitives in the provided snippet. However, there are moderate security concerns: (1) it expects local raw credentials (.env.profiles.local) which can be read and misused; (2) it exposes generic browser automation primitives without documented technical scope restrictions or enforcement of user confirmation. These factors make the module operationally risky in a compromised or untrusted runtime. Recommend: require interactive browser OAuth or ephemeral tokens instead of raw credential files, add enforceable confirmation checks (non-bypassable prompts or operator policies), and implement host-scoping/allowlist for browser-control actions to limit unintended effects.