vercel
Audited by Socket on Mar 1, 2026
2 alerts found:
Obfuscated Filex2The login fragment is not obviously malicious in terms of delivering malware, backdoors, or destructive payloads. However, it contains aggressive client-side instrumentation, API patching, session/cookie-based tracking, and heavy reliance on external analytics scripts. This increases privacy risks and possible data exfiltration pathways through augmented requests and third-party script behavior. A targeted audit of external dependencies (Sift scripts and Next.js chunks), explicit user consent flows, and minimization of header-augmentation would mitigate risk. Treat as a medium-risk pattern warranting further review, especially for consent, data handling, and external Script integrity.
The analyzed login fragment primarily functions as a telemetry and anti-abuse harness embedded in a login flow. It patches networking APIs to inject headers and monitor/redirect traffic, loads remote analytics and KPSDK-like components, and persists session identifiers via cookies and localStorage. While telemetry can be legitimate for fraud prevention and user experience analytics, the combination of external script loading, dynamic code execution, and request interception on a sensitive login page elevates privacy and supply-chain risk. Recommend strict supply-chain vetting of all remote scripts, explicit user-consent for telemetry, minimization of intercepted data, and network-monitoring to verify that headers and redirections do not enable unintended data leakage. Consider removing or sandboxing non-essential remote analytics on the login page, and ensure all analytics domains are trusted and auditable.