camofox-browser

Warn

Audited by Socket on Feb 15, 2026

2 alerts found:

AnomalySecurity
AnomalyLOW
references/anti-detection.md

The document is marketing/README material for an anti-detection Firefox fork that claims engine-level (C++) modifications to hide automation signals and to humanize behavior. The text itself contains no executable code, no obvious hard-coded credentials, and no direct evidence of exfiltration or backdoors. However, the described capabilities are high-risk from an abuse standpoint (facilitate scraping, fraud, evasion). Because there is no implementation included, we cannot confirm presence or absence of malicious code; a full security assessment requires reviewing patches, build artifacts, and binaries. Treat this project as potentially dangerous for misuse and require code/binary audit and reproducible builds before trust or deployment.

Confidence: 75%Severity: 60%
SecurityMEDIUM
SKILL.md

Functionally the skill implements a coherent anti-detection browser automation tool — capabilities align with its stated purpose. However, significant supply-chain and abuse risks exist: the setup downloads a large binary from an unspecified source without integrity checks, the skill enables routing traffic through arbitrary proxies, and it purposefully provides tooling to bypass bot protections. These factors make the package SUSPICIOUS for supply-chain use: it could be abused for scraping, credential theft, or other malicious activity if the downloaded binary or scripts are compromised. Recommend: treat the install artifact as untrusted until its origin and checksums/signatures are validated; restrict use to trusted operators and environments; add provenance, cryptographic verification, and least-privilege controls.

Confidence: 80%Severity: 70%
Audit Metadata
Analyzed At
Feb 15, 2026, 09:20 PM
Package URL
pkg:socket/skills-sh/yelban%2Fcamofox-browser-skills%2Fcamofox-browser%2F@f0eae420ce38c08be5dc57d9e9f737654dc11545