baoyu-post-to-x

Warn

Audited by Socket on Apr 25, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/x-utils.ts

This code is a high-capability local automation helper: it launches/controls Chrome via CDP, reads sensitive Twitter/X authentication cookies (auth_token/ct0) to check session persistence, and performs clipboard copy/paste by executing companion Bun scripts. While the fragment does not show network exfiltration or explicit malware behavior, it meaningfully increases privacy/security exposure through sensitive cookie access and clipboard manipulation, and it executes OS commands and external processes (npx/bun). Treat as a security-sensitive component requiring review of the companion clipboard scripts and audit of the caller’s trust boundaries for profileDir and clipboard inputs.

Confidence: 62%Severity: 66%
Audit Metadata
Analyzed At
Apr 25, 2026, 12:48 AM
Package URL
pkg:socket/skills-sh/jimliu%2Fbaoyu-skills%2Fbaoyu-post-to-x%2F@ce216810558cc9318d9addd1b76b6afde1847025