paw-cra-agent-designer

Warn

Audited by Socket on Apr 2, 2026

1 alert found:

Anomaly
AnomalyLOW
references/template-examples.md

The fragment appears primarily to be a templating/rendering utility, not overt malware. However, it has notable security risks: (1) unescaped variable injection directly into HTML/attributes that are rendered by Puppeteer, (2) Puppeteer running with --no-sandbox, which magnifies the impact of any malicious HTML/URL content, (3) potential outbound network fetching during rendering when injected URLs are used, and (4) direct screenshot path usage without validation shown here. If variables/templatePath/outputPath can be influenced by an attacker, this should be treated as a security alert and hardened (escaping/sanitization, strict URL allowlists, sandbox re-enabled, and path validation).

Confidence: 72%Severity: 66%
Audit Metadata
Analyzed At
Apr 2, 2026, 09:36 AM
Package URL
pkg:socket/skills-sh/pawbytes%2Fskill-suites%2Fpaw-cra-agent-designer%2F@02287156405b5883024db3dedd09d76ee89ee041