real-browser

Warn

Audited by Socket on Mar 16, 2026

2 alerts found:

Anomalyx2
AnomalyLOW
SKILL.md

The skill is purpose-consistent: it launches a real logged-in Chrome and delegates browser automation to a same-org companion skill. It is not overtly malicious, but it is high-impact because it uses cloned login state, broad browser automation, and transitive skill trust; overall this is best classified as suspicious/high-risk automation rather than malware.

Confidence: 82%Severity: 68%
AnomalyLOW
scripts/real_browser.sh

Legitimate tooling: The script is a convenience tool to clone a user's Chrome profile and launch a separate Chrome instance exposing Chrome DevTools Protocol for automation. It does not contain code that exfiltrates data or spawns remote shells. However, it intentionally copies sensitive authentication data (cookies, login databases, localStorage, indexedDB, etc.) into a new profile and exposes that profile to local CDP clients. This design creates a high-sensitivity capability: any local process able to reach http://127.0.0.1:${PORT} (or the agent-browser tool invoked) can access and extract the user's session tokens and other secrets via CDP. Therefore the script is safe in trusted, single-user environments when used as intended, but it is potentially dangerous if run in untrusted contexts or bundled into code that executes it without user consent. I do not classify it as malware, but it presents a meaningful privacy/security risk due to cloning and exposing login state.

Confidence: 90%Severity: 60%
Audit Metadata
Analyzed At
Mar 16, 2026, 06:03 PM
Package URL
pkg:socket/skills-sh/xxww0098%2Fskills-hub%2Freal-browser%2F@e2e0d4da628f0e3117d8d13f1e75f866d7b370ea