crawler

Fail

Audited by Socket on Mar 5, 2026

2 alerts found:

Obfuscated FileMalware
Obfuscated FileHIGH
rules/network-crawling.md

This code is a high-risk, dual-use automation recipe: it deliberately harvests browser authentication artifacts and instructs persisting and reusing them in automated crawlers. There is no direct network exfiltration to external domains present, so it is not classic malware, but the patterns enable credential theft, unauthorized replay, and large-scale scraping if misused or run in shared/CI environments. Treat these snippets and the NETWORK.md artifact instructions as sensitive. If retained in a repository, add strong warnings, redact outputs, restrict execution to controlled test accounts, and avoid writing secrets to logs or files.

Confidence: 98%
MalwareHIGH
rules/anti-bot-checklist.ko.md

This file should be treated as an operational evasion playbook for bypassing browser fingerprinting and CAPTCHA protections. It contains actionable instrumentation (Playwright snippets), explicit recommendations to use third-party CAPTCHA-solving services and Anti-Detect tooling, and advice to manipulate protocol-level fingerprints. While not containing obfuscated or self-exfiltrating malware code, it materially facilitates abusive automation (scraping, fraud, account takeover) and privacy-compromising operations. Use of these techniques in production against third-party sites likely violates terms of service and could be illegal depending on jurisdiction.

Confidence: 75%Severity: 85%
Audit Metadata
Analyzed At
Mar 5, 2026, 09:52 PM
Package URL
pkg:socket/skills-sh/alpoxdev%2Fhypercore%2Fcrawler%2F@4c9158c8f3900f9e3b9cea65b107a58ebc81805e