browser
Warn
Audited by Socket on May 12, 2026
2 alerts found:
SecurityAnomalySecurityagent-workspace/domain-skills/alaska/checkout.md
MEDIUMSecurityMEDIUM
agent-workspace/domain-skills/alaska/checkout.md
Anomalyinteraction-skills/profile-sync.md
LOWAnomalyLOW
interaction-skills/profile-sync.md
No definitive malware is evidenced in the provided fragment; it reads like product documentation for a cookie-syncing feature. However, it describes two major supply-chain/security concerns: executing a network-fetched installer via `curl | sh`, and handling real browser authentication cookies by uploading/persisting them in a remote cloud service and using them to start authenticated remote browser sessions. This creates substantial privacy/account-takeover risk if misconfigured (e.g., overly broad domain scope), if secrets/API credentials are mishandled, or if any part of the installer/cloud chain is compromised.
Confidence: 100%Severity: 60%
Audit Metadata