web-scraper
Audited by Socket on Mar 5, 2026
1 alert found:
AnomalyThe code fragment represents a feature-rich browser automation server intended for remote control of a Playwright browser instance via a local UNIX socket. While largely legitimate in intent, it includes facilities that allow executing arbitrary page JavaScript (EXTRACT_JS / eval path) and returns data through sockets, which constitutes a plausible data-exfiltration surface if inputs are untrusted. The presence of empty declarations for critical JS fragments and a syntax error suggests the fragment is incomplete or mis-specified, which elevates risk due to potential runtime failures. Overall, there is a medium security risk primarily due to the ability to run arbitrary code in the page context and to exfiltrate data via the socket interface, combined with incomplete/erroneous code paths that could be exploited or cause unexpected behavior.