logicnazi writes: "Several scripts on userscripts.org were recently discovered to contain malicious code. If installed the modified scripts uploaded the user's cookie information to the attacker for any page visited by the user triggering the greasemonkey script. Some users have reported that "Google Image Type Recognition", "Cookie Editor," "Gmail Conversation Preview" are among the affected scripts but no complete list is available. Details about the situation, including instructions to check if you were affected, are available here. This is unrelated to the recent downtime at userscripts.org. So is there any way to protect the average greasemonkey user from malicious scripts?"