analyzing-browser-forensics-with-hindsight

Warn

Audited by Socket on Apr 6, 2026

1 alert found:

Security
SecurityMEDIUM
scripts/agent.py

This code implements a browser-artefact harvester: it reads Chrome/Edge/Chromium/B r a v e profile databases for History, Downloads, Cookies, and Web Data (autofill), and parses extension manifests. Harvesting cookies and autofill values is a common credential-theft capability. This snippet shows no explicit network exfiltration or persistence, but the sensitive data collection and “suspicious activity” targeting strongly suggest potential malicious use (or a stealer component) rather than benign forensics. Confidence is reduced because the provided fragment appears syntactically corrupted (cursor.execute) and may not reflect full behavior (e.g., missing exfiltration/reporting).

Confidence: 62%Severity: 70%
Audit Metadata
Analyzed At
Apr 6, 2026, 06:46 PM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fanalyzing-browser-forensics-with-hindsight%2F@e483cbd8356b5e904716d869a13258a47f05b2a3