kali

Fail

Audited by Socket on Feb 16, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Instruction to copy/paste content into terminal detected All findings: [CRITICAL] command_injection: Instruction to copy/paste content into terminal detected (CI012) [AITech 9.1.4] [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] This skill is coherent with its stated purpose: it documents direct access to a Kali Docker container and provides commands for a broad set of pentesting tools. There is no hidden exfiltration, obfuscation, or hard-coded credentials in the provided text. However the document includes high-risk instructions (host networking, NET_ADMIN/NET_RAW capabilities, running as root, wide mounts and chmod 777), and it references an unspecified 'kali-comprehensive' image without provenance — a supply-chain concern. The content is dual-use: benign when used with written authorization and a trusted image, but easily abused for unauthorized scanning, exploitation, or network attacks. Recommend verifying the image source (use the official Kali images or pinned digests), applying least-privilege (limit capabilities, avoid host network unless required), avoid running as root when unnecessary, and ensure authorized scope and logging before use. LLM verification: The skill is an operationally powerful but potentially high-risk documentation for running a Kali Docker container and dozens of offensive-security tools. I found no explicit obfuscated code, hidden network exfiltration, or direct evidence of malware in the provided content. The main risks are: (1) running an unverified 'kali-comprehensive' image (supply-chain risk); (2) granting elevated network/host capabilities (--network host, NET_RAW, NET_ADMIN); (3) enabling arbitrary command execution via

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 16, 2026, 11:59 PM
Package URL
pkg:socket/skills-sh/cyb3rdudu%2Fdotfiles%2Fkali%2F@1e76a1b229ad47e711064b0a01ba6364e975bcd3