baoyu-danger-gemini-web

Warn

Audited by Socket on Mar 9, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/gemini-webapi/utils/load-browser-cookies.ts

The code is not overtly malware (no suspicious remote exfiltration, no obfuscation, no hard-coded credentials). However, it intentionally extracts Google authentication/session cookies via a locally started browser's DevTools Protocol and persists them to disk. That capability is high-privilege and privacy-sensitive: if misused or run in an untrusted environment it can enable account takeover or session theft. Treat this module as sensitive: review how and where cookies are persisted (file permissions and consumers), ensure it runs only in trusted contexts, and consider requiring explicit user consent/secure storage for extracted cookies.

Confidence: 75%Severity: 60%
Audit Metadata
Analyzed At
Mar 9, 2026, 02:17 PM
Package URL
pkg:socket/skills-sh/jimliu%2Fbaoyu-skills%2Fbaoyu-danger-gemini-web%2F@6c31600bb308d7d3807b3fb90d096ecde7e7faa7