SMTP Penetration Testing
Audited by Socket on Mar 10, 2026
1 alert found:
MalwareThe skill presents a coherent SMTP penetration testing workflow aligned with its stated purpose, including service discovery, banner/granular capability checks, user enumeration, open-relay testing, brute-force authentication, TLS assessment, and SPF/DKIM/DMARC analysis. The tool chain and command references are typical for legitimate security testing but carry substantial risk if used without explicit authorization and proper controls. The footprint is proportionate to its stated goal, but the presence of multiple third-party security tools and the potential to perform credential guessing raise elevated risk, especially regarding scope, consent, and data handling. Overall, the skill is SUSPICIOUS rather than BENIGN due to the sensitive operations and broad tool usage, requiring strict per-target authorization, audited execution, and careful handling of credentials and results.