browser
Audited by Socket on Feb 28, 2026
1 alert found:
SecurityThis skill is functionally coherent with its stated purpose (remote control of the user's real Chrome via the alma CLI). However, it grants very high-privilege capabilities: reuse of existing authenticated sessions/cookies, arbitrary page JS execution, and the ability to perform clicks/typing/navigation. Those capabilities are legitimate for automation but are also exactly what an attacker needs to act inside the user's authenticated sessions or to exfiltrate secrets. The document lacks safeguards (per-action confirmations, domain whitelists, explicit restrictions on `eval`), so when used by an autonomous agent or a malicious prompt the skill presents a high risk of unauthorized actions or data theft. I did not find embedded malicious code or external download-execute chains, so this is not confirmed malware, but it is high security risk if granted to an untrusted agent or used without strict human oversight.