Skip to content

Security: six-ddc/browser-cli

Security

SECURITY.md

Security Policy

Reporting a Vulnerability

If you discover a security vulnerability, please report it responsibly:

  1. Do NOT open a public issue.
  2. Email the maintainer or use GitHub's private vulnerability reporting.
  3. Include a description of the vulnerability, steps to reproduce, and potential impact.

We will acknowledge receipt within 48 hours and aim to release a fix promptly.

Security Considerations

Browser-CLI is a browser automation tool with elevated permissions by design:

  • Extension permissions: The extension requires <all_urls>, tabs, cookies, scripting, and storage permissions to function.
  • Local-only communication: The daemon binds to 127.0.0.1 by default — it does not accept remote connections.
  • Auth token: When binding to a non-loopback host (--ws-host), a cryptographic auth token is required for WebSocket connections. The token is stored at ~/.browser-cli/auth-token with 0600 permissions.
  • URL scheme blocking: Navigation commands (navigate, tab new, window new) block dangerous URL schemes (javascript:, data:, vbscript:).
  • evaluate command: Executes arbitrary JavaScript in the page's MAIN world. Only use with trusted input.
  • Unix socket: The daemon socket is created in ~/.browser-cli/ with default file permissions.

There aren’t any published security advisories