video-downloader
Audited by Socket on Mar 11, 2026
2 alerts found:
Obfuscated Filex2This module implements an obfuscated token-generation algorithm (X-Bogus) derived from payload, form and UA inputs plus timestamp. It resembles anti-bot/request-signing code commonly used to interact with protected web APIs. The fragment contains no direct malicious behaviors such as credential harvesting, command execution, or network exfiltration by itself. However, the obfuscated nature and intended use for crafting requests to an API may enable automated access or evasion of protections; review how it is used in the larger project. The file appears truncated which reduces full assessment confidence.
The skill concept is coherent for a general video-downloading utility leveraging yt-dlp, with additional Douyin-specific cookie handling via Playwright. However, the design creates non-trivial data sensitivity around cookies (saved locally) and browser automation that could lead to unintended credential exposure if misused or extended. The automatic dependency installation and cookie-based workflow introduce data-flow and supply-chain considerations that elevate risk beyond a minimal benign tool. Overall, it leans toward SUSPICIOUS/HIGHER risk due to credential handling and potential exfiltration pathways, but not clearly malicious in its current stated form. Recommend implementing explicit consent prompts, minimized cookie handling, and secure, verifiable dependency management (lockfiles, checksums, and clear data-flow diagrams).