browserwing-executor

Pass

Audited by Socket on Mar 9, 2026

Checks
Malicious behaviorInjection, exfiltration, untrusted installs
Security concernsCredential exposure, tool/trust exploitation
Code obfuscationHidden or obfuscated code
Suspicious patternsReconnaissance, excessive autonomy, resource use
Audit Metadata
Analyzed At
Mar 9, 2026, 12:27 PM
Package URL
pkg:socket/skills-sh/MemTensor%2FMemOS%2Fbrowserwing-executor%2F@9a88ca843b2f3e815c5c49fbf5463f8fdb98fc46