penetration-tester

Fail

Audited by Socket on Feb 15, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
scripts/auth_test.py

This module is a small dual-use pentesting helper. It contains no obvious obfuscated or hidden malware, no credential-harvesting code, and no network exfiltration built into the Python itself. The primary security concern is explicit: it invokes the external tool 'hydra' to perform brute-force authentication attempts when enabled. That behavior can cause real-world harm if run without authorization. Recommendations: restrict defaults to safe mode (brute force disabled), add stronger target validation and allowlist or require explicit consent, build proper hydra argument construction (protocol, host, form spec), add a confirmation prompt or 'dry-run' mode, and log minimally sensitive info or encrypt reports. Use only in authorized testing contexts.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 15, 2026, 08:20 PM
Package URL
pkg:socket/skills-sh/404kidwiz%2Fclaude-supercode-skills%2Fpenetration-tester%2F@ad27f3287fea450dd2794b37aa9b2cdc824befb5