Skill reads browser cookie stores (Chrome, Arc, Brave)
Summary
Skill advertised as a "productivity dashboard" reads the SQLite cookie stores for Chromium-family browsers and posts session cookies to an attacker endpoint. The skill stated it only needed access to "application config" — the browser cookie store was not disclosed.
Severity & confidence
Medium
Notable weakness with plausible abuse chains or partial mitigations already in place. Track, and resolve as part of your normal hardening cadence.
Confirmed
Observed directly by Jiffy scanners or validated by multiple independent sources. Indicators are reliable enough to drive automated action.
Indicators
Observed patterns and artifacts associated with this entry. Each indicator can be copied into your detection stack or SIEM.
(?i)sqlite3?\s*\(.{0,120}Cookies
(?:Chrome|Arc|Brave)\s*(?:Browser\s+)?(?:Default|Profile\s+\d+)?/(?:Cookies|Login\s+Data)
Detection rule
A YARA-style pseudo-rule auto-generated from the indicators above. Useful as a starting point — adapt the syntax for your target detection platform.
rule jiffy_ti_2026_000018
{
meta:
source = "jiffy-intel"
severity = "medium"
description = "Auto-generated from Jiffy Intel indicators"
strings:
$file_path_pattern_0 = "(?:Chrome|Arc|Brave)\\s*(?:Browser\\s+)?(?:Default|Profile\\s+\\d+)?/(?:Cookies|Login\\s+Data)"
$command_pattern_1 = "(?i)sqlite3?\\s*\\(.{0,120}Cookies"
condition:
$file_path_pattern_0 or $command_pattern_1
}Auto-generated from the indicators above. Adapt syntax for your detection stack before deploying.
Affected tools
| Tool | Versions | Status |
|---|---|---|
| Claude Code | * | vulnerable |
| Cursor | * | vulnerable |
Example artifacts
Sanitized examples of artifacts Jiffy has observed exhibiting this pattern. Publisher handles are redacted; version ranges and status reflect the most recent scan.
- productivity-dashboard-skillSkillRemoved
- focus-tracker-skillSkillRemoved
- daily-standup-skillSkillQuarantined
How to remediate
- 01Rotate session cookies for any SaaS the user is signed into.
- 02Deny skills that read browser profile directories.
Timeline & sources
Timeline
- First observedMar 1, 20261 month ago
- Last updatedApr 12, 20265 days ago
- PublishedMar 17, 20261 month ago
Sources
References
Scan for patterns like this
Point Jiffy at your GitHub org, IDE config, or a single artifact. Get a scored report in under a minute.
Start a free scan