puppeteer-automation

skills-sh:mindrally_skills__puppeteer-automation

View source
B
84/100

First Seen

Feb 18, 2026

Last Scanned

Feb 20, 2026

Findings

6

Score

84/100

MEDIUM 2
LOW 4

Findings (6)

MEDIUM
Privilege escalation
L43

Detects privilege escalation patterns like setuid, chown root, or sudo with shell commands

setuid
FIX

Avoid depending on packages that could be subject to typosquatting or name confusion. Verify package ownership, check download counts, and audit the package source before adding dependencies.

FP?

Likely FP if the flagged package is a well-known, high-download-count package from a verified publisher.

MEDIUM
Privilege escalation
L67

Detects privilege escalation patterns like setuid, chown root, or sudo with shell commands

setuid
FIX

Avoid depending on packages that could be subject to typosquatting or name confusion. Verify package ownership, check download counts, and audit the package source before adding dependencies.

FP?

Likely FP if the flagged package is a well-known, high-download-count package from a verified publisher.

LOW
Dynamic code evaluation
L126

Detects eval() or exec() used for dynamic code execution

eval('
FIX

Replace eval()/exec() with a safer alternative such as json.loads(), ast.literal_eval(), or a purpose-built parser.

FP?

Likely FP if the matched text contains 'exec' as part of a word (e.g., 'execute', 'execution') rather than an actual eval() or exec() call.

LOW
Dynamic code evaluation
L129

Detects eval() or exec() used for dynamic code execution

eval('
FIX

Replace eval()/exec() with a safer alternative such as json.loads(), ast.literal_eval(), or a purpose-built parser.

FP?

Likely FP if the matched text contains 'exec' as part of a word (e.g., 'execute', 'execution') rather than an actual eval() or exec() call.

LOW
Dynamic code evaluation
L132

Detects eval() or exec() used for dynamic code execution

eval('
FIX

Replace eval()/exec() with a safer alternative such as json.loads(), ast.literal_eval(), or a purpose-built parser.

FP?

Likely FP if the matched text contains 'exec' as part of a word (e.g., 'execute', 'execution') rather than an actual eval() or exec() call.

LOW
Dynamic code evaluation
L356

Detects eval() or exec() used for dynamic code execution

eval('
FIX

Replace eval()/exec() with a safer alternative such as json.loads(), ast.literal_eval(), or a purpose-built parser.

FP?

Likely FP if the matched text contains 'exec' as part of a word (e.g., 'execute', 'execution') rather than an actual eval() or exec() call.