playwright-local
Audited by Socket on Feb 15, 2026
2 alerts found:
Obfuscated Filex2This file is an explicit operational guide for bypassing anti-bot measures and automating authenticated scraping with examples that store credentials/session cookies, use third-party captcha solvers, and route traffic via proxies. It does not contain traditional malware code, but it materially increases the risk of credential exposure, unauthorized data access, privacy breaches, and large-scale abusive scraping. If found bundled as a dependency, it should be treated as high-risk operational tooling: audit, restrict, or remove it and replace with legitimate API usage and secure secret handling.
The provided Playwright stealth guide contains explicit anti-detection techniques and operational guidance (runtime fingerprint manipulation, proxy/CAPTCHA handling, UA/viewport randomization). The code is not malware per se, but it materially lowers detection and barrier controls and thus has high abuse potential. Key risks: credential leakage to proxies/CAPTCHA providers, weaker host isolation when using --no-sandbox flags, and facilitation of policy-violating automation. Treat this package/use of these techniques as high operational and abuse risk; if deployed, enforce strict environment isolation, credential handling, and legal review.