baoyu-post-to-x
Warn
Audited by Socket on Apr 25, 2026
1 alert found:
AnomalyAnomalyscripts/x-utils.ts
LOWAnomalyLOW
scripts/x-utils.ts
This code is a high-capability local automation helper: it launches/controls Chrome via CDP, reads sensitive Twitter/X authentication cookies (auth_token/ct0) to check session persistence, and performs clipboard copy/paste by executing companion Bun scripts. While the fragment does not show network exfiltration or explicit malware behavior, it meaningfully increases privacy/security exposure through sensitive cookie access and clipboard manipulation, and it executes OS commands and external processes (npx/bun). Treat as a security-sensitive component requiring review of the companion clipboard scripts and audit of the caller’s trust boundaries for profileDir and clipboard inputs.
Confidence: 62%Severity: 66%
Audit Metadata