social-media-posting

Warn

Audited by Socket on Mar 10, 2026

1 alert found:

Anomaly
AnomalyLOW
references/platform-posting.md

This is a detailed automation playbook for posting to many social platforms via Puppeteer and direct API/webhook calls. It contains explicit instructions to extract session cookies from Chrome profiles and reuse them in HTTP requests, and provides low-level techniques to bypass UI protections (CDP accessibility/Runtime calls, system clipboard pastes). While not containing obfuscated or self-propagating malware code, it documents credential-harvesting and evasion techniques that enable account takeover, stealthy automated posting, or large-scale abusive activity. Treat this material as high-risk operational guidance: do not run these steps with sessions/accounts you do not own, and protect any tokens/cookies used. Recommended actions: restrict distribution, audit any scripts implementing these patterns, and avoid storing or logging extracted session cookies or tokens.

Confidence: 85%Severity: 65%
Audit Metadata
Analyzed At
Mar 10, 2026, 03:52 PM
Package URL
pkg:socket/skills-sh/anton-abyzov%2Fvskill%2Fsocial-media-posting%2F@e3d25776125cff8daa71adec03280d928b57fd6f