cdp
Audited by Socket on Apr 21, 2026
1 alert found:
AnomalyNo overt malware indicators are present in this wrapper (no external networking, no hardcoded secrets, no hidden payloads). However, the code is intentionally a high-privilege design: it forwards arbitrary caller-controlled JavaScript to a persistent local `/eval` endpoint and starts the evaluation service automatically. The primary risk is misuse or weakness in `repl.ts` (e.g., lack of service-side authentication/authorization, unsafe CDP command handling, or overly permissive access). Additionally, the default `/tmp` log target can be risky in multi-user contexts. Overall: treat as a powerful local eval harness; inspect `repl.ts` and the server binding/auth model to determine the true security posture.