electrobun-window-management

Warn

Audited by Socket on Feb 21, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

[Skill Scanner] [Documentation context] Credential file access detected This skill is coherent with its stated purpose and contains no obvious malicious code or supply-chain download-execute patterns. Primary security concerns are expected: loading arbitrary remote URLs into BrowserView and exposing generic inter-window RPC/broadcast APIs. These increase the attack surface and require runtime controls (origin validation, RPC authorization, content sandboxing). No credential harvesting, obfuscated code, or external command execution was found. LLM verification: [LLM Escalated] This skill appears functionally correct for window/view management and does not contain obvious obfuscated or explicitly malicious code (no remote installers, hardcoded credentials, or shell execution). The primary security concern is the RPC/broadcast patterns that forward arbitrary method calls between windows and the loading of arbitrary URLs into BrowserViews without shown sandboxing — together these create a high-risk abuse path if untrusted content or untrusted window IDs are used. Overall

Confidence: 90%Severity: 75%
Audit Metadata
Analyzed At
Feb 21, 2026, 04:07 AM
Package URL
pkg:socket/skills-sh/rajavijayach%2Felectrobun-skills%2Felectrobun-window-management%2F@7e1454fada00822ca869d87eadbdea2a4e7a9334