1c-web-session

Fail

Audited by Snyk on Mar 7, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). The package is primarily an automation toolkit, but it contains a high-risk remote-code-execution vector: it reads arbitrary JavaScript from the clipboard and (via eval) executes it in the runner context (with access to the Playwright page and Node fs/network), combined with clipboard manipulation and filesystem I/O — this enables credential theft, data exfiltration and arbitrary host actions if an attacker can place code into the clipboard or trick an operator into running a crafted clipboard payload.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 7, 2026, 11:33 PM