superwall-editor
Pass
Audited by Gen Agent Trust Hub on May 1, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill relies on a local bash script (
scripts/sw-editor.sh) to perform operations. The script is well-structured, usingset -euo pipefailand proper variable quoting to prevent shell injection. It usesjq's--argand--argjsonflags for safe JSON construction when passing arguments to API calls. - [EXTERNAL_DOWNLOADS]: The script uses
curlto interact withhttps://superwall-mcp.superwall.com. This is the official relay service provided by the vendor ('superwall') and is essential for the skill's purpose. All network operations are performed over HTTPS. - [CREDENTIALS_UNSAFE]: The skill manages a short-lived
controllerTokenissued during the 'attach' process. This token is stored in a local state file (.superwall/state.json) which is protected with restrictive permissions (chmod 600) and stored in a directory withchmod 700. The script includes specific logic to strip these credentials from user-facing status commands to prevent accidental leakage in chat logs.
Audit Metadata