File Path Traversal Testing
Audited by Socket on Feb 16, 2026
1 alert found:
Malware[Skill Scanner] Credential file access detected All findings: [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] This skill is a comprehensive, dual-use offensive testing guide for path traversal and LFI exploitation. It is internally consistent with its stated purpose (testing/exploitation) and contains no embedded obfuscated malware or hidden network exfiltration. However, it documents explicit, actionable techniques to read highly sensitive files and escalate to RCE (log poisoning, php wrappers), so it is high-risk if used without authorization. Use should be limited to authorized security testing and accompanied by legal/ethical safeguards. LLM verification: The skill is a high-fidelity, dual-use pentesting guide for path traversal/LFI. Its capabilities and payloads align with its stated purpose (BENIGN in intent for authorized testing) but the content is sensitive and can be readily abused if used without permission. There are no hidden network exfiltration endpoints or obfuscated payloads, and no direct credential harvesting code — however the omission of explicit legal/ethical guidance and the inclusion of highly sensitive targets increases misus