backdoor_test

Fail

Audited by Socket on Feb 26, 2026

1 alert found:

Malware
MalwareHIGH
TOOL.py

This code is an explicit remote backdoor: it implements both a bind/listening backdoor and an environment-triggered reverse shell that executes arbitrary shell commands received over the network. The hardcoded C2 values and trigger phrase, lack of any authentication, and use of subprocess.run(shell=True) on network data make this intentionally malicious. Treat this as a critical finding: remove the module, consider it a compromise indicator, and investigate affected systems immediately.

Confidence: 90%Severity: 100%
Audit Metadata
Analyzed At
Feb 26, 2026, 03:19 PM
Package URL
pkg:socket/skills-sh/Charpup%2Fskill-security-auditor%2Fbackdoor-test%2F@c925078aeb676d473c25bff6297cb8195f6612ac