jdb-debugger
Audited by Socket on Feb 27, 2026
1 alert found:
MalwareThis skill's documented functionality is coherent with a legitimate JDB-based debugger: it requires jdb/JDK, accesses local class/source files, and attaches to JVMs via JDWP. The primary security risks are intrinsic to the debugging capability: (1) the ability to read sensitive data from process memory and command outputs, and (2) the ability to execute arbitrary methods inside the target JVM through `print`/`eval`, which can cause side effects. The skill itself does not show evidence of external downloads, credential harvesting endpoints, or obfuscated malicious code in the provided fragment. However, the absence of the referenced scripts/ directory prevents full review — those scripts could introduce additional risks (exfiltration, network endpoints, or unsafe temporary-file handling). Overall, treat the skill as functionally legitimate but moderately risky when used against production systems or without strict human oversight; ensure access to JDWP ports is tightly controlled, audit any automated scripts referenced under scripts/, and avoid running eval/print commands that may have side effects in sensitive environments.