web-exploit-prover
Audited by Socket on Mar 9, 2026
1 alert found:
Obfuscated FileThe skill presents a coherent, methodology-focused framework intended to transform vulnerability leads into validated exploit outcomes with structured phases and output formats. While it aligns with a defensive security testing workflow, the described autonomous exploitation-like steps and data-handling implications introduce significant risk if misused. The footprint is proportionate to a high-assurance testing methodology but requires strict per-action user prompts, environment controls, and explicit data-handling safeguards to mitigate abuse. Overall, the concept is suspiciously balanced toward potential misuse unless tightly constrained; treat as suspicious with strong emphasis on governance, access controls, and auditing before deployment.