tweet-rl-tracker
Audited by Socket on Feb 16, 2026
1 alert found:
Obfuscated FileThe module implements legitimate functionality for scraping tweet content, capturing screenshots (including seeking to a video timestamp), and saving records to Notion. I did not find explicit malicious code or obfuscation inside the provided fragment. However, the operations it performs are high-privilege and can expose sensitive data if misused: evaluate_script runs arbitrary JS in the page context, an authenticated Chrome profile is required (exposes session-scoped data), screenshots are saved locally and uploaded to arbitrary external hosts (primary exfiltration vector), and temporary files are not managed securely by default. Recommend operational mitigations: use a dedicated, minimal Chrome profile for scraping; restrict and control external hosting (use operator-owned S3/cloud with proper ACLs); sanitize or redact screenshots if they may contain private information; securely delete temporary files; and audit evaluate_script contents before execution. Treat the code as functionally legitimate but operationally sensitive.