order-analysis
Audited by Socket on Mar 3, 2026
1 alert found:
SecurityThe skill's stated purpose (automated analysis of internal ticket system data) is plausible and the workflow aligns with that purpose. However, the implementation pattern — reading a local JS file and injecting it verbatim into a browser session via agent-browser eval, requiring Chrome remote debugging (CDP 9222), and running helper shell scripts — creates significant supply-chain and data-exfiltration risk. The combination of arbitrary JS execution in a page context and access to internal site state (cookies, localStorage, session tokens) is disproportionate for a simple analysis task unless the injected script is tightly reviewed and the environment is strongly isolated. Recommend treating this skill as suspicious: require code signing or integrity checks for scripts/order-analysis.js, avoid long-lived CDP exposure, restrict agent-browser installation sources to trusted registries, and perform an explicit audit of any helper scripts and the injected JS before use.