swain-search
Audited by Socket on May 7, 2026
2 alerts found:
AnomalySecurityNo direct indicators of intentional malware are present in this snippet. The main security risks are operational/abuse-oriented: arbitrary outbound fetching driven by user-controlled URLs (possible SSRF/egress policy bypass depending on runtime) and optional execution of a caller-supplied helper executable (potential arbitrary code execution in automation workflows if attackers can influence --browser-export-helper). If URL/helper inputs and --out-dir are strictly controlled upstream (e.g., allowlisted domains and trusted helper paths), malware likelihood is low; otherwise, the module should be reviewed and sandboxed accordingly.
SUSPICIOUS. The core research/normalization purpose is coherent, but the actual footprint is broader than necessary: third-party API routing for X threads, browser-cookie forwarding to yt-dlp, dynamic unpinned runtime installs, and mandatory remote git pushes. This looks more like an overpowered research automation skill than confirmed malware, but it carries high security risk.