jianying-video-gen
Audited by Socket on Apr 5, 2026
1 alert found:
AnomalyOverall, this module behaves like an authenticated downloader/scraper: it uses local cookies to access a per-thread page, extracts an MP4 URL from remote content, and downloads it using curl to the local filesystem. No direct indicators of stealthy malware (persistence/exfiltration/keylogging) are present in this fragment. However, the security risk is non-trivial because remote page-derived mp4_url is used directly as the curl fetch target (no visible allowlist/validation), enabling unexpected outbound requests and downloading attacker-chosen content under an authenticated session; additionally, the embedded thread_id is used in the output filename without sanitization, and the browser runs with reduced sandbox hardening. Treat it as potentially risky automation and review for URL and filename validation and correct/complete implementation of page.evaluate.