visual-verify

Warn

Audited by Socket on May 7, 2026

1 alert found:

Security
SecurityMEDIUM
scripts/dom-assert.mjs

This module is not clearly a self-contained malware payload, but it is security-sensitive by design: it executes attacker-controlled JavaScript in the browser target via CDP Runtime.evaluate (through explicit 'eval' actions and 'custom' assertions) and can navigate to attacker-controlled URLs without validation. If the JSON input or CDP endpoint is not fully trusted, the risk is high because this provides arbitrary code execution in the page context, which can be used for data access or hostile actions.

Confidence: 74%Severity: 78%
Audit Metadata
Analyzed At
May 7, 2026, 03:13 AM
Package URL
pkg:socket/skills-sh/hixuanxuan%2Fbrowser-automation%2Fvisual-verify%2F@7ac01eb186a1559f740d7aaebc6306b6e432d991