create-attack-technique

Fail

Audited by Socket on Feb 25, 2026

2 alerts found:

SecurityObfuscated File
SecurityMEDIUM
SKILL.md

The provided fragment is a coherent, benign documentation/guidance piece outlining how to structure and implement cloud-based attack techniques within Stratus Red Team. There are no embedded payloads, credential reads, or external network calls in this fragment. Used as intended (documentation and scaffolding for legitimate red-team activities with proper authorization), it presents low immediate risk. Caution is warranted if the template is repurposed to implement intrusive techniques without consent, as the lifecycle (detonate/revert) implies capability for active cloud changes.

Confidence: 75%Severity: 75%
Obfuscated FileHIGH
assets/sample-attack-technique.go

This module intentionally disables and re-enables CloudTrail for a named trail via the AWS SDK. Within the stratus-red-team project this is expected behavior for simulation and detection testing. The file contains no signs of credential theft, data exfiltration, obfuscation, or conventional malware. Primary security risk: misuse or accidental execution against production resources (suppresses audit logs). Recommend restricting execution to authorized test accounts, enforcing least-privilege IAM, auditing use of the framework, and reviewing the embedded main.tf content.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 25, 2026, 10:11 AM
Package URL
pkg:socket/skills-sh/DataDog%2Fstratus-red-team%2Fcreate-attack-technique%2F@56ded6d63b457e4eca7c0ca767ad9c74bac62c4c