chrome-cdp
Audited by Socket on May 1, 2026
1 alert found:
SecurityNo explicit malware is shown in this fragment because it is protocol documentation rather than implementation code. However, the described IPC control surface is high-privilege: it supports arbitrary JavaScript execution (eval), raw CDP passthrough (evalraw), navigation to attacker-controlled URLs (nav), and extraction/return of page content and network timing over the socket. If the Unix socket under /tmp is not strongly permissioned and the daemon lacks authorization and strict input/path validation (especially for evalraw and shot), an attacker who can reach the socket could gain powerful browser control and data extraction capability. Review the actual daemon implementation for socket permission hardening, authentication/authorization, and strict allowlisting/validation for eval/evalraw and screenshot paths.