cdp

Warn

Audited by Socket on Apr 21, 2026

1 alert found:

Anomaly
AnomalyLOW
sdk/browser-harness-js

No overt malware indicators are present in this wrapper (no external networking, no hardcoded secrets, no hidden payloads). However, the code is intentionally a high-privilege design: it forwards arbitrary caller-controlled JavaScript to a persistent local `/eval` endpoint and starts the evaluation service automatically. The primary risk is misuse or weakness in `repl.ts` (e.g., lack of service-side authentication/authorization, unsafe CDP command handling, or overly permissive access). Additionally, the default `/tmp` log target can be risky in multi-user contexts. Overall: treat as a powerful local eval harness; inspect `repl.ts` and the server binding/auth model to determine the true security posture.

Confidence: 62%Severity: 60%
Audit Metadata
Analyzed At
Apr 21, 2026, 05:08 AM
Package URL
pkg:socket/skills-sh/browser-use%2Fbrowser-harness-js%2Fcdp%2F@95b7a22a923714c45d2f7234b2bfa8fa6322c2eb