instagram-pipeline

Warn

Audited by Socket on Feb 28, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

Functionally, the package does what it claims: it uses Chrome session cookies to authenticate to Instagram, fetches saved post metadata and CDN URLs, downloads media, and runs local transcription/OCR to populate extracted_text fields. I found no explicit code in the provided fragment that forwards cookies or extracted data to attacker-controlled domains or contains backdoor commands. However, the design requires reading raw browser session cookies (a sensitive capability) and often asks for broad OS permissions (macOS Full Disk Access). Combined with platform-native model dependencies (likely downloaded at install/runtime) and third-party distribution, this creates a moderate supply-chain and privilege risk: if any bundled script or transitive native/model dependency is compromised, an attacker could access many local secrets and exfiltrate them. Operators should verify sources, minimize granted privileges, pin/verify external binaries and models, and monitor network activity during initial runs.

Confidence: 98%Severity: 75%
Audit Metadata
Analyzed At
Feb 28, 2026, 04:53 AM
Package URL
pkg:socket/skills-sh/simonstrumse%2Fvibelabs-skills%2Finstagram-pipeline%2F@c4f8e153813d620fbfffc75a5fb0c70f8db25cf5