go-rod-master

Fail

Audited by Socket on Mar 18, 2026

2 alerts found:

AnomalyMalware
AnomalyLOW
examples/stealth_page.go

The code is an automation tool that demonstrates stealth browser techniques to bypass bot detection and test detection sites. It does not read sensitive inputs, nor does it appear to exfiltrate data or execute backdoors. The primary security considerations are potential misuse for evading anti-bot defenses and resource usage (browser download and headless browsing). Overall risk is moderate due to evasion usage but no malicious payload is evident in the fragment.

Confidence: 59%Severity: 60%
MalwareHIGH
SKILL.md

SUSPICIOUS. The skill is broadly consistent with a Rod automation guide and mostly uses official Go-module sources, so it does not look like credential theft or malware. However, it understates risk: it promotes anti-bot evasion, includes request hijacking, shows certificate-check disabling, and references a questionable stale pre-download path. Overall this is a medium-risk automation skill, not a 'safe' one.

Confidence: 87%Severity: 58%
Audit Metadata
Analyzed At
Mar 18, 2026, 02:02 AM
Package URL
pkg:socket/skills-sh/sickn33%2Fantigravity-awesome-skills%2Fgo-rod-master%2F@8366d558333be32c29b814f09621df6af84917d9