linkedin

Fail

Audited by Socket on Feb 22, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

The package/skill appears to implement LinkedIn engagement features that match its documentation. I found no direct evidence of embedded malware, backdoor code, obfuscated payloads, or external downloader primitives in the provided snippet. However, there are moderate security concerns: (1) it expects local raw credentials (.env.profiles.local) which can be read and misused; (2) it exposes generic browser automation primitives without documented technical scope restrictions or enforcement of user confirmation. These factors make the module operationally risky in a compromised or untrusted runtime. Recommend: require interactive browser OAuth or ephemeral tokens instead of raw credential files, add enforceable confirmation checks (non-bypassable prompts or operator policies), and implement host-scoping/allowlist for browser-control actions to limit unintended effects.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 22, 2026, 02:05 PM
Package URL
pkg:socket/skills-sh/zuttam%2Fbusiness-growth-mp%2Flinkedin%2F@d81b7a66c40ba26c5e8845e8cb42c00423cd53c2