fk-boss-greeting

PassAudited by VirusTotal on May 14, 2026.

Findings (1)

The skill automates job applications by extracting Chrome browser cookies via an external CLI tool (~/.local/bin/boss), which is a high-risk activity involving sensitive credential access. It also contains a hardcoded local development path (/Users/huguiqi/...) in SKILL.md for updates and uses a .sh extension for a Python script in scripts/boss_auto_greet.sh. While these behaviors align with the stated purpose of automation, the reliance on browser credential extraction and shell execution warrants caution.