order-analysis

Warn

Audited by Socket on Mar 3, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

The skill's stated purpose (automated analysis of internal ticket system data) is plausible and the workflow aligns with that purpose. However, the implementation pattern — reading a local JS file and injecting it verbatim into a browser session via agent-browser eval, requiring Chrome remote debugging (CDP 9222), and running helper shell scripts — creates significant supply-chain and data-exfiltration risk. The combination of arbitrary JS execution in a page context and access to internal site state (cookies, localStorage, session tokens) is disproportionate for a simple analysis task unless the injected script is tightly reviewed and the environment is strongly isolated. Recommend treating this skill as suspicious: require code signing or integrity checks for scripts/order-analysis.js, avoid long-lived CDP exposure, restrict agent-browser installation sources to trusted registries, and perform an explicit audit of any helper scripts and the injected JS before use.

Confidence: 75%Severity: 75%
Audit Metadata
Analyzed At
Mar 3, 2026, 01:42 AM
Package URL
pkg:socket/skills-sh/heimanba%2Forder-analysis-skill%2Forder-analysis%2F@b27bf6d798f26ca49e0b599f71d7de5abd76f1dd