Interceptor
Audited by Socket on May 2, 2026
2 alerts found:
Securityx2This fragment is not overtly malicious by itself, but it documents and operationalizes a high-risk architecture: an optional macOS native bridge that exposes extensive sensitive OS capabilities over a permissive, unauthenticated local UNIX socket in /tmp, and is launched persistently via a LaunchAgent. Combined with an update pipeline that runs git fetch and bun install/build scripts, this creates substantial local-attack and supply-chain-amplification risk. Immediate review should focus on enforcing socket permissions, adding authentication/authorization and strict client allowlisting, validating framed JSON payloads, and tightening dependency integrity controls (locking/pinning/auditing) for bun install/build.
SUSPICIOUS. The skill is coherent with its stated browser-automation purpose and the upstream tool provenance appears legitimate, so this is not confirmed malware. However, it is a high-impact skill: it uses real logged-in browser sessions, can expose cookies/headers/network data, enables authenticated actions on websites, and optionally adds an unauthenticated local bridge with OS-level input/screen/clipboard/audio powers. The footprint is aligned but unusually powerful, so overall risk is medium-high.