browser

Warn

Audited by Socket on Mar 29, 2026

1 alert found:

Anomaly
AnomalyLOW
references/form-automation.md

No direct malware or exfiltration logic is demonstrated in this fragment; it is documentation for a powerful browser automation CLI. However, it explicitly exposes high-risk primitives—especially caller-controlled arbitrary JavaScript execution in a page context, alongside credential entry, DOM inspection, and screenshot capture. Treat the associated MCP/tabz capability surface as elevated risk and ensure strict authorization, auditing, and restrictions around selector/value/script inputs before use in any untrusted or multi-tenant context.

Confidence: 62%Severity: 68%
Audit Metadata
Analyzed At
Mar 29, 2026, 02:17 AM
Package URL
pkg:socket/skills-sh/ggprompts%2Ftabzchrome%2Fbrowser%2F@014536616b4d0a1fa02c94bbe72bb492315aebfb