spot-competitor-sales-activity
Audited by Socket on Apr 17, 2026
3 alerts found:
Anomalyx3No clear malware behavior is evident in this fragment (single fixed HTTPS destination, no persistence/backdoor/exfil beyond intended API authentication). The primary security risk is the use of `source` on a discovered `.env` file discovered via directory traversal, which can enable arbitrary command execution if the `.env` contents/location are attacker-controlled. METHOD/ENDPOINT are unvalidated and could cause unintended requests, but they do not appear to enable arbitrary host targeting in this snippet.
SUSPICIOUS: The skill is internally coherent as an OpenFunnel competitor-activity workflow and the documented API flow appears to target official OpenFunnel endpoints, not an obvious credential-harvesting proxy. However, it relies on unseen local shell scripts that write/read credentials from .env and can create ongoing paid monitoring signals, so the trust boundary and credential handling are broader than ideal.
This module appears to be a legitimate sign-up/verification helper that communicates only with a fixed OpenFunnel API domain and stores returned credentials locally as intended by the script’s comments. However, it carries moderate security/abuse risk due to sensitive API key persistence to a local .env file, fragile parsing of JSON responses using grep/cut, and unescaped JSON construction from user-controlled inputs (risk of malformed/manipulated payloads). No strong indicators of overt malware or supply-chain sabotage are present in this fragment, but the credential-handling and parsing approach should be reviewed and hardened (e.g., JSON escaping and a proper JSON parser) before use in security-sensitive environments.