cookie-sync

Warn

Audited by Socket on May 19, 2026

1 alert found:

Security
SecurityMEDIUM
scripts/cookie-sync.mjs

No clear indicators of hidden malware (no obfuscation, no eval/dynamic execution, no persistence/backdoor primitives). However, this module performs a highly sensitive operation: it exports authentication cookies from a local Chrome session and injects them into a remote persistent Browserbase context, optionally enhancing automation stealth and shaping geolocation via proxy. This design creates significant privacy and account-takeover risk if misused (especially with broad domain selection, stolen/incorrect API key/context, or unsafe operational practices such as logging session identifiers).

Confidence: 67%Severity: 70%
Audit Metadata
Analyzed At
May 19, 2026, 06:36 AM
Package URL
pkg:socket/skills-sh/browserbase%2Fskills%2Fcookie-sync%2F@3809cae83f51b2a86425a65c051fe90e16107baa