job-auto-apply

Warn

Audited by Socket on Apr 9, 2026

1 alert found:

Anomaly
AnomalyLOW
SETUP.md

This fragment is not direct malware code; it is an automation setup guide that materially enables a high-autonomy job-application workflow. The main security risks are (a) sensitive credential storage in secrets.md for automatic login/registration, (b) creation of an AUTO-EXECUTE loop that can submit applications/sign eSignatures without further user prompts, (c) runtime supply-chain exposure via npx @playwright/mcp@latest, and (d) reduced safety gating via --dangerously-skip-permissions in the cron command. Malicious intent or data exfiltration cannot be confirmed from this snippet alone; review the unseen /job-auto-apply and bootstrap.js code paths to rule out credential theft or covert network activity.

Confidence: 60%Severity: 67%
Audit Metadata
Analyzed At
Apr 9, 2026, 06:30 PM
Package URL
pkg:socket/skills-sh/liruihan000%2Fclaude-job-auto-apply%2Fjob-auto-apply%2F@aa900e1fc2163e19da2549ff9f5c3a650582620d