enrich-and-research
Audited by Socket on Apr 17, 2026
3 alerts found:
Anomalyx3No clear malware behavior is evident in this fragment (single fixed HTTPS destination, no persistence/backdoor/exfil beyond intended API authentication). The primary security risk is the use of `source` on a discovered `.env` file discovered via directory traversal, which can enable arbitrary command execution if the `.env` contents/location are attacker-controlled. METHOD/ENDPOINT are unvalidated and could cause unintended requests, but they do not appear to enable arbitrary host targeting in this snippet.
This module appears to be a legitimate sign-up/verification helper that communicates only with a fixed OpenFunnel API domain and stores returned credentials locally as intended by the script’s comments. However, it carries moderate security/abuse risk due to sensitive API key persistence to a local .env file, fragile parsing of JSON responses using grep/cut, and unescaped JSON construction from user-controlled inputs (risk of malformed/manipulated payloads). No strong indicators of overt malware or supply-chain sabotage are present in this fragment, but the credential-handling and parsing approach should be reviewed and hardened (e.g., JSON escaping and a proper JSON parser) before use in security-sensitive environments.
SUSPICIOUS. The skill's business-research workflow is mostly coherent with its stated purpose and official OpenFunnel docs, and data flow appears directed to same-brand OpenFunnel APIs rather than a third-party proxy. The main risk is hidden trust in bundled shell scripts that collect login data, persist credentials to .env, and broker all API calls without their contents being available for review.