web-scraper

Warn

Audited by Socket on Mar 5, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/browser_session.py

The code fragment represents a feature-rich browser automation server intended for remote control of a Playwright browser instance via a local UNIX socket. While largely legitimate in intent, it includes facilities that allow executing arbitrary page JavaScript (EXTRACT_JS / eval path) and returns data through sockets, which constitutes a plausible data-exfiltration surface if inputs are untrusted. The presence of empty declarations for critical JS fragments and a syntax error suggests the fragment is incomplete or mis-specified, which elevates risk due to potential runtime failures. Overall, there is a medium security risk primarily due to the ability to run arbitrary code in the page context and to exfiltrate data via the socket interface, combined with incomplete/erroneous code paths that could be exploited or cause unexpected behavior.

Confidence: 50%Severity: 55%
Audit Metadata
Analyzed At
Mar 5, 2026, 07:39 AM
Package URL
pkg:socket/skills-sh/LiranUdi%2Fopenclaw-web-scraper%2Fweb-scraper%2F@3590fe78ff1a58f251c85cc3c9a611ac99e3dcfa