link-to-im

Warn

Audited by Socket on Apr 17, 2026

3 alerts found:

Anomalyx3
AnomalyLOW
SKILL.md

SUSPICIOUS: the skill is largely aligned with its stated IM-bridge purpose, but it creates a high-trust remote control surface for the coding agent, stores multiple platform credentials locally, and relies on local helper binaries with limited provenance evidence here. This looks more like a legitimate but medium-risk bridge/ops skill than outright malware.

Confidence: 80%Severity: 64%
AnomalyLOW
scripts/supervisor-macos.sh

No clear indicators of malicious payload behavior are present in this fragment; it functions as a standard launchd supervisor for a Node.js daemon. However, it significantly increases credential exposure by embedding API keys/provider secrets into a generated LaunchAgents plist on disk and by logging to configurable file paths. Additionally, it constructs plist XML via unescaped interpolation, which can cause malformed configuration if values contain XML-sensitive characters. Overall: likely legitimate process management with medium security risk driven by secret handling and plist/XML hygiene.

Confidence: 67%Severity: 62%
AnomalyLOW
scripts/spawn-fix.cjs

No explicit signs of data exfiltration or classic malware (no network calls, credential theft, persistence, or obfuscated payload execution) are present in this fragment. The main supply-chain/security concern is behavioral: it globally monkey-patches child_process on Windows and can redirect execution based on filesystem-based parsing of .cmd/.bat files and existence checks for derived scripts. If untrusted inputs or batch files can be influenced, this could enable execution of unintended local scripts, making the module security-sensitive and requiring review/validation of its necessity and input trust boundaries.

Confidence: 61%Severity: 60%
Audit Metadata
Analyzed At
Apr 17, 2026, 01:57 AM
Package URL
pkg:socket/skills-sh/d-wwei%2FAgents-To-IM%2Flink-to-im%2F@1af65b22be8d129b4d90ffb07ebb0b3829bb96a7