baoyu-danger-gemini-web
Warn
Audited by Socket on Mar 9, 2026
1 alert found:
AnomalyAnomalyscripts/gemini-webapi/utils/load-browser-cookies.ts
LOWAnomalyLOW
scripts/gemini-webapi/utils/load-browser-cookies.ts
The code is not overtly malware (no suspicious remote exfiltration, no obfuscation, no hard-coded credentials). However, it intentionally extracts Google authentication/session cookies via a locally started browser's DevTools Protocol and persists them to disk. That capability is high-privilege and privacy-sensitive: if misused or run in an untrusted environment it can enable account takeover or session theft. Treat this module as sensitive: review how and where cookies are persisted (file permissions and consumers), ensure it runs only in trusted contexts, and consider requiring explicit user consent/secure storage for extracted cookies.
Confidence: 75%Severity: 60%
Audit Metadata