browser-agent

Fail

Audited by Socket on Feb 16, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Installation of third-party script detected This skill documentation describes powerful and legitimate browser automation capabilities consistent with its stated purpose. There is a moderate security risk primarily from operational misuse or misconfiguration: handling of user credentials, potential forwarding of scraped-sensitive data to third-party LLMs, and explicit emphasis on bypassing anti-bot protections. There is no evidence in the provided text of obfuscation or embedded malware; however, because browser automation can perform account actions and exfiltrate data, reviewers should inspect the actual implementation and actionbook recipes for: where credentials are accepted/stored, whether data is sent to external endpoints (LLMs or other domains) without redaction, and whether recipes include third-party intermediaries. Recommended precautions: treat credentials carefully (use ephemeral/test accounts), audit recipe files for external network calls, and configure LLM integrations to avoid sending secrets or PII. LLM verification: The provided SKILL.md (documentation) does not contain direct evidence of malicious code or intentional exfiltration, but it reveals multiple supply-chain and operational risks: unpinned installation instructions (pip install browser-use), absence of secret-handling guidance, and distribution of precomputed automation recipes without demonstrated vetting. Before trusting runtime behavior, review implementation files for network endpoints, telemetry, recipe contents, and any dynamic code executio

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 16, 2026, 10:16 PM
Package URL
pkg:socket/skills-sh/Azure12355%2Fweilan-skills%2Fbrowser-agent%2F@d4cc90143417724e6b0db77f8125ea7641b93574