paw-cra-agent-designer
Warn
Audited by Socket on Apr 2, 2026
1 alert found:
AnomalyAnomalyreferences/template-examples.md
LOWAnomalyLOW
references/template-examples.md
The fragment appears primarily to be a templating/rendering utility, not overt malware. However, it has notable security risks: (1) unescaped variable injection directly into HTML/attributes that are rendered by Puppeteer, (2) Puppeteer running with --no-sandbox, which magnifies the impact of any malicious HTML/URL content, (3) potential outbound network fetching during rendering when injected URLs are used, and (4) direct screenshot path usage without validation shown here. If variables/templatePath/outputPath can be influenced by an attacker, this should be treated as a security alert and hardened (escaping/sanitization, strict URL allowlists, sandbox re-enabled, and path validation).
Confidence: 72%Severity: 66%
Audit Metadata