firecrawl
Audited by Socket on Feb 18, 2026
1 alert found:
Obfuscated FileNo evidence of intentionally malicious code or obfuscated payloads exists in the provided documentation. The feature set and required API key are consistent with a legitimate cloud scraping/browser automation CLI. The main security consideration is the trust boundary: user data (URLs, scraped content, and any scripts) are transmitted to and executed in Firecrawl's cloud environment. Users should treat the provider as a sensitive data processor, avoid sending secrets or PII, review provider policies (retention, access controls, audits), and ensure .firecrawl/ outputs are handled securely. Recommended mitigations include: avoid embedding secrets in pages/scripts sent to the service, restrict API key scope where possible, enable least-privilege concurrency/credits, and verify provider security assurances before processing sensitive data.