web-scraping

Fail

Audited by Socket on Feb 16, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
apify/examples/anti-blocking/.actor/actor.json

The manifest configures a scraper that explicitly enables anti-detection measures (fingerprinting and residential proxies) and allocates resources for prolonged scraping. The file itself contains no executable logic or direct indicators of malware (no hard-coded credentials, no suspicious domains), but the configuration increases the potential for abusive or privacy-invasive scraping depending on the unseen implementation. Recommend: review the actor source (Playwright scripts), Dockerfile, proxy configuration/credentials, and any external endpoints used at runtime. Enforce least-privilege for proxy credentials and dataset storage, audit scraped fields for sensitive data, and vet the operator intent before deployment.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 16, 2026, 12:55 AM
Package URL
pkg:socket/skills-sh/yfe404%2Fweb-scraper%2Fweb-scraping%2F@21f72ade5162f2993cd387a054d5c7caef11ffec