baoyu-danger-gemini-web
Audited by Socket on Mar 1, 2026
2 alerts found:
MalwareAnomalyThe component behaves like a plausible Gemini Web client with a consent-driven flow and local session management. However, the use of reverse-engineered API access, browser-based OAuth, and local credential artifacts (cookies, session data) introduces privacy, policy, and supply-chain risk. Treat as SUSPICIOUS-to-MEDIUM risk pending verification of official API terms, secure handling of credentials, and validation of endpoints. No definitive malware is evident in this fragment; focus risk assessment on authentication data handling and external API access.
This module is designed to automate obtaining authenticated Google (Gemini) cookies by launching or attaching to Chrome via the DevTools Protocol, polling for session readiness, and persisting cookies to disk. The code does not contain obvious obfuscated malware, remote command/backdoor behavior, or calls to attacker-controlled endpoints. However, it performs sensitive actions: retrieving and storing authentication cookies and controlling a browser process. That behavior is high-risk from a credential-exposure perspective and could be misused to harvest credentials if used without explicit user consent. Recommend treating this component as sensitive: audit its use, ensure the user knows cookies will be extracted and stored, restrict access to the cookie cache file, and verify provenance of the package before use.