mf
Audited by Socket on Mar 27, 2026
3 alerts found:
Anomalyx2SecurityBest report selection: Report 2 is the best baseline because it accurately characterizes the primary risk as capability abuse rather than claiming overt malware. Improved assessment: This module is a high-power browser automation/extraction tool. The dominant security issue is arbitrary page-context code execution via CDP Runtime.evaluate using a verbatim caller-supplied evalExpr. Additionally, optional DOM snapshotting and varNames-based window introspection can return sensitive page data back to the caller via stdout. No direct signs of system-damaging malware, persistence, cryptomining, or external network exfiltration appear in this fragment; however, misuse (or untrusted control of evalExpr/varNames/dumpDom) would create significant security risk.
SUSPICIOUS: The visible skill is mostly coherent with a Module Federation helper, but its actual footprint is broader than a simple docs skill because it includes shell execution, file edits, arbitrary curl, and delegated instructions in unseen reference files. The main risk is execution/data egress flexibility rather than clear malicious intent.
The fragment is not directly obfuscated malware, but it intentionally creates a high-privilege, authenticated browser automation environment: it copies a real logged-in Chrome profile (cookies/auth) into a debug directory and launches Chrome with DevTools remote debugging enabled (port 9222). Any automation attaching to CDP (browser-capture.mjs) can act within the user’s authenticated context and capture derived logs/data. Because browser-capture.mjs is not provided, confirm whether captured data is only returned to the local caller or also sent to remote endpoints.