radkit-remote-access

Pass

Audited by Socket on Mar 6, 2026

Checks
Malicious behaviorInjection, exfiltration, untrusted installs
Security concernsCredential exposure, tool/trust exploitation
Code obfuscationHidden or obfuscated code
Suspicious patternsReconnaissance, excessive autonomy, resource use
Audit Metadata
Analyzed At
Mar 6, 2026, 12:33 AM
Package URL
pkg:socket/skills-sh/automateyournetwork%2Fnetclaw%2Fradkit-remote-access%2F@873d83c3a2d51a8d55b245d93a5eb4ac1609f564