job-auto-apply
Audited by Socket on Apr 9, 2026
1 alert found:
AnomalyThis fragment is not direct malware code; it is an automation setup guide that materially enables a high-autonomy job-application workflow. The main security risks are (a) sensitive credential storage in secrets.md for automatic login/registration, (b) creation of an AUTO-EXECUTE loop that can submit applications/sign eSignatures without further user prompts, (c) runtime supply-chain exposure via npx @playwright/mcp@latest, and (d) reduced safety gating via --dangerously-skip-permissions in the cron command. Malicious intent or data exfiltration cannot be confirmed from this snippet alone; review the unseen /job-auto-apply and bootstrap.js code paths to rule out credential theft or covert network activity.