ui-reverse-engineering
Audited by Socket on May 8, 2026
2 alerts found:
Anomalyx2This snippet appears to be a targeted automation/measurement tool for scrubbing WAAPI animations by injecting a local scrubber script into a third-party page context and capturing resulting frames. No overt malware indicators (hardcoded secrets, direct exfiltration, reverse shells) are visible in the fragment. The main security concern is supply-chain integrity and high-consequence execution: it uses agent-browser eval to execute full local script contents inside an external site, with SKILL_DIR selection influenced by environment-derived paths. Review and verify the contents and integrity of waapi-scrub-inject.js and capture-frames.sh, and restrict/validate directory resolution and inputs.
No direct evidence of classic malware is present in the provided fragment. The dominant security issue is supply-chain and runtime trust risk: the workflow automatically downloads third-party CSS/assets from discovered remote URLs and imports the resulting CSS verbatim into application globals.css, which can enable unsafe external resource loading or UI manipulation if sanitization/allowlisting is not rigorously enforced. Additionally, the use of agent-browser eval in the extraction pipeline is a notable high-suspicion primitive that should be minimized or tightly controlled. Security posture depends heavily on strict URL allowlists and sanitization of downloaded CSS before import.