traffic-analysis

Fail

Audited by Socket on Feb 16, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] BENIGN. The code fragment is documentation and example usage for legitimate traffic-analysis tools. It presents standard, well-known commands and workflows for capturing, filtering, and analyzing network traffic. No credential collection, backdoors, or suspicious network behavior is evident. The data flows described follow normal analysis pipelines from live capture to offline examination, with outputs confined to capture files and command outputs. The surrounding guidance appropriately cautions about potential data exposure in real environments and emphasizes authorized use. LLM verification: The document is a legitimate instructional skill for packet capture and network analysis tools. It does not contain malware or hidden exfiltration behaviors. The main security concern is operational: the examples show how to capture full packet payloads and search for credentials (e.g., tcpdump -A, grep 'password'), which can expose sensitive data if used without authorization. Administrators should only use these commands in authorized contexts and protect stored pcap files. No evidence of obfu

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 16, 2026, 10:32 AM
Package URL
pkg:socket/skills-sh/chaterm%2Fterminal-skills%2Ftraffic-analysis%2F@f26a075b4ddc32a8ac75b00a48528e1c8b998687