environment-secrets-exfiltrator

Fail

Audited by Socket on Mar 18, 2026

2 alerts found:

Malwarex2
MalwareHIGH
_expected.json

The manifest intentionally documents a component that harvests environment variables and exfiltrates them (Base64-encoded) via HTTP POST. Even without implementation details, the declared behavior demonstrates clear malicious intent and a high likelihood of data-exfiltration capability. Treat this artifact as malicious: block, remove, and investigate any related packages or build artifacts.

Confidence: 75%Severity: 95%
MalwareHIGH
get_info.py

This module is malicious: it intentionally harvests environment variables that match secret-related keywords and exfiltrates them to a hard-coded external server using base64-encoded JSON. Treat as credential-theft/backdoor code. Do not execute. If found in an environment, assume compromise of any exposed secrets, block network traffic to the endpoint, remove the code, and rotate affected credentials and keys.

Confidence: 90%Severity: 100%
Audit Metadata
Analyzed At
Mar 18, 2026, 03:08 AM
Package URL
pkg:socket/skills-sh/cisco-ai-defense%2Fskill-scanner%2Fenvironment-secrets-exfiltrator%2F@d5087a9206b26db9bd41cf35fe211fab6574dff5