clawdcursor

Warn

Audited by Socket on Mar 11, 2026

1 alert found:

Anomaly
AnomalyLOW
src/computer-use.ts

This module is not obviously obfuscated or containing traditional malware constructs (no reverse shell, no command exec via child_process, no hard-coded credentials). However it is a high-risk component for privacy and supply-chain abuse: it captures full screenshots and accessibility trees and sends them (along with an API key) to a remote LLM endpoint, then executes arbitrary desktop actions instructed by that remote model. If the remote model or the configured endpoint is malicious or the API key/overrides are compromised, sensitive data can be exfiltrated and the host can be driven to perform harmful actions. Use only with strong endpoint trust, strict redaction/whitelisting, and hardened safety controls.

Confidence: 90%Severity: 60%
Audit Metadata
Analyzed At
Mar 11, 2026, 05:51 AM
Package URL
pkg:socket/skills-sh/amrdab%2Fclawd-cursor%2Fclawdcursor%2F@d0945b73c3ce3bb76baa499c186b0a30a1b74500