chrome-cdp

Warn

Audited by Socket on May 1, 2026

1 alert found:

Security
SecurityMEDIUM
references/daemon-ipc.md

No explicit malware is shown in this fragment because it is protocol documentation rather than implementation code. However, the described IPC control surface is high-privilege: it supports arbitrary JavaScript execution (eval), raw CDP passthrough (evalraw), navigation to attacker-controlled URLs (nav), and extraction/return of page content and network timing over the socket. If the Unix socket under /tmp is not strongly permissioned and the daemon lacks authorization and strict input/path validation (especially for evalraw and shot), an attacker who can reach the socket could gain powerful browser control and data extraction capability. Review the actual daemon implementation for socket permission hardening, authentication/authorization, and strict allowlisting/validation for eval/evalraw and screenshot paths.

Confidence: 55%Severity: 70%
Audit Metadata
Analyzed At
May 1, 2026, 04:52 AM
Package URL
pkg:socket/skills-sh/dashed%2Fclaude-marketplace%2Fchrome-cdp%2F@0d21c027f56a34cb44c848a9000fe54f7026bbf7