crawler
Audited by Socket on May 4, 2026
5 alerts found:
Anomalyx3Securityx2No evidence of classic malware behavior (exfiltration, persistence, command execution, credential theft) exists in the provided fragment. However, the content is explicitly oriented toward evading anti-bot and CAPTCHA protections by manipulating browser and network fingerprints (including TLS/JA3) and timing/interaction patterns. As a supply-chain component, this would materially increase downstream capability for automated bypass and abuse, so it warrants careful review and likely rejection depending on intended use.
This code performs high-sensitivity authentication evidence capture using CDP: it reads cookies and token-like values from browser storage, inspects Authorization usage for API calls, captures selected headers, and logs anti-bot/rate-limit signals. No explicit external exfiltration or system compromise is shown, but the token/cookie harvesting pattern and implied persistence into raw evidence files create a meaningful risk of secret leakage via logs and stored artifacts. Treat as security-sensitive tooling and ensure strong redaction, minimal retention, and access control of any generated evidence.
This fragment is a crawler template with multiple “stealth” mechanisms (TLS/JA3 impersonation via `curl_cffi`, automation-detection evasion flags in `patchright`, and proxy-based stealth plus human-like interaction). It does not show direct malware behaviors such as data theft, persistence, or command execution, but it strongly indicates intent to bypass anti-bot/protection systems. Overall: low evidence of classic malware, but elevated security risk due to anti-evasion and potential abuse.
전반적으로 목적(크롤링 조사·문서화·코드 생성)과 핵심 기능은 대체로 일치하지만, 안티봇 우회 도구 사용과 인증 신호 수집 범위가 크고, `npx @latest`·전이적 skill 설치·텔레메트리 등 공급망/데이터 흐름 측면의 위험이 결합되어 있다. 악성으로 단정할 근거는 없지만, 고위험 크롤링·우회 자동화 스킬로 보는 것이 타당하다.
This artifact is a multi-layer anti-bot evasion playbook (browser fingerprint spoofing, TLS/JA3/JA4 impersonation guidance, behavioral mimicry) with CAPTCHA-detection and CAPTCHA-bypass workflow references (including third-party solver services). The snippets shown mainly perform fingerprint/DOM inspection, logging, and screenshot-based testing, with no direct evidence of malware such as exfiltration or system compromise in the fragment alone. Nevertheless, it substantially facilitates bypassing access controls and automated challenge enforcement, creating a meaningful misuse and security-review requirement in a software supply chain.