linkedin-scraper
Audited by Socket on Feb 17, 2026
1 alert found:
Obfuscated FileThe artifact is functionally consistent with its declared objective (scraping LinkedIn via an authenticated browser session). There is no explicit embedded malware or obfuscation in the provided content. However, the design depends on a high-privilege 'browser relay' and references a workspace with unclear trust boundaries — these are primary supply-chain and privacy risks. The explicit anti-detection/stealth guidance and bulk-scraping parameters increase likelihood of abusive large-scale data harvesting. Risk can be materially reduced only if the browser relay and any DuckDB workspace are verified to be local, under the user's control, and subject to strict access controls; otherwise, treat this component as potentially dangerous for privacy and credential exposure.