cookie-sync
Warn
Audited by Socket on May 19, 2026
1 alert found:
SecuritySecurityscripts/cookie-sync.mjs
MEDIUMSecurityMEDIUM
scripts/cookie-sync.mjs
No clear indicators of hidden malware (no obfuscation, no eval/dynamic execution, no persistence/backdoor primitives). However, this module performs a highly sensitive operation: it exports authentication cookies from a local Chrome session and injects them into a remote persistent Browserbase context, optionally enhancing automation stealth and shaping geolocation via proxy. This design creates significant privacy and account-takeover risk if misused (especially with broad domain selection, stolen/incorrect API key/context, or unsafe operational practices such as logging session identifiers).
Confidence: 67%Severity: 70%
Audit Metadata