browser

Warn

Audited by Socket on May 12, 2026

2 alerts found:

SecurityAnomaly
SecurityMEDIUM
agent-workspace/domain-skills/alaska/checkout.md
AnomalyLOW
interaction-skills/profile-sync.md

No definitive malware is evidenced in the provided fragment; it reads like product documentation for a cookie-syncing feature. However, it describes two major supply-chain/security concerns: executing a network-fetched installer via `curl | sh`, and handling real browser authentication cookies by uploading/persisting them in a remote cloud service and using them to start authenticated remote browser sessions. This creates substantial privacy/account-takeover risk if misconfigured (e.g., overly broad domain scope), if secrets/API credentials are mishandled, or if any part of the installer/cloud chain is compromised.

Confidence: 100%Severity: 60%
Audit Metadata
Analyzed At
May 12, 2026, 11:32 AM
Package URL
pkg:socket/skills-sh/browser-use%2Fbrowser-harness%2Fbrowser%2F@f186cd963d67653a737bfaaf43e0edbfe85ddb77