spot-companies-and-people-with-active-pain-points
Audited by Socket on Apr 17, 2026
3 alerts found:
Anomalyx3SUSPICIOUS. The overall purpose aligns with OpenFunnel lead-search functionality and same-brand service usage, but the skill depends on unreviewed local shell scripts that store/read credentials from .env and mediate all API traffic. That makes the capability footprint somewhat broader and less transparent than the markdown claims, raising medium security concern without enough evidence for malware.
No clear malware behavior is evident in this fragment (single fixed HTTPS destination, no persistence/backdoor/exfil beyond intended API authentication). The primary security risk is the use of `source` on a discovered `.env` file discovered via directory traversal, which can enable arbitrary command execution if the `.env` contents/location are attacker-controlled. METHOD/ENDPOINT are unvalidated and could cause unintended requests, but they do not appear to enable arbitrary host targeting in this snippet.
This module appears to be a legitimate sign-up/verification helper that communicates only with a fixed OpenFunnel API domain and stores returned credentials locally as intended by the script’s comments. However, it carries moderate security/abuse risk due to sensitive API key persistence to a local .env file, fragile parsing of JSON responses using grep/cut, and unescaped JSON construction from user-controlled inputs (risk of malformed/manipulated payloads). No strong indicators of overt malware or supply-chain sabotage are present in this fragment, but the credential-handling and parsing approach should be reviewed and hardened (e.g., JSON escaping and a proper JSON parser) before use in security-sensitive environments.