extract-axure-data

Warn

Audited by Socket on Apr 14, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/extract.mjs

No clear, direct malware (no reverse shells, no exfiltration to suspicious domains, no explicit credential harvesting) is present in this fragment. However, the module performs two high-risk operations: (1) it installs and imports Playwright at runtime via execSync using environment-influenced download host, and (2) it fetches remote Axure JavaScript and executes it in a Node vm context. If an attacker can control the provided baseUrl or the environment variables, this could be leveraged for sandbox escape or supply-chain redirection. Recommend pinning dependencies, removing runtime installs, and hardening/avoiding execution of untrusted remote JS.

Confidence: 62%Severity: 52%
Audit Metadata
Analyzed At
Apr 14, 2026, 01:00 AM
Package URL
pkg:socket/skills-sh/lintendo%2FAxhub-Skills%2Fextract-axure-data%2F@af16bd05c0a6d03ff5aae6dc614ce4f6014461e0