spot-competitor-sales-activity

Warn

Audited by Socket on Apr 17, 2026

3 alerts found:

Anomalyx3
AnomalyLOW
api.sh

No clear malware behavior is evident in this fragment (single fixed HTTPS destination, no persistence/backdoor/exfil beyond intended API authentication). The primary security risk is the use of `source` on a discovered `.env` file discovered via directory traversal, which can enable arbitrary command execution if the `.env` contents/location are attacker-controlled. METHOD/ENDPOINT are unvalidated and could cause unintended requests, but they do not appear to enable arbitrary host targeting in this snippet.

Confidence: 68%Severity: 56%
AnomalyLOW
SKILL.md

SUSPICIOUS: The skill is internally coherent as an OpenFunnel competitor-activity workflow and the documented API flow appears to target official OpenFunnel endpoints, not an obvious credential-harvesting proxy. However, it relies on unseen local shell scripts that write/read credentials from .env and can create ongoing paid monitoring signals, so the trust boundary and credential handling are broader than ideal.

Confidence: 79%Severity: 57%
AnomalyLOW
signup.sh

This module appears to be a legitimate sign-up/verification helper that communicates only with a fixed OpenFunnel API domain and stores returned credentials locally as intended by the script’s comments. However, it carries moderate security/abuse risk due to sensitive API key persistence to a local .env file, fragile parsing of JSON responses using grep/cut, and unescaped JSON construction from user-controlled inputs (risk of malformed/manipulated payloads). No strong indicators of overt malware or supply-chain sabotage are present in this fragment, but the credential-handling and parsing approach should be reviewed and hardened (e.g., JSON escaping and a proper JSON parser) before use in security-sensitive environments.

Confidence: 72%Severity: 56%
Audit Metadata
Analyzed At
Apr 17, 2026, 06:12 PM
Package URL
pkg:socket/skills-sh/openfunnel%2Fopenfunnel-skills%2Fspot-competitor-sales-activity%2F@b63f387160de38c96cf09f142b41c1b1c1251214