cwe-113-http-response-splitting

Pass

Audited by Socket on Mar 6, 2026

Checks
Malicious behaviorInjection, exfiltration, untrusted installs
Security concernsCredential exposure, tool/trust exploitation
Code obfuscationHidden or obfuscated code
Suspicious patternsReconnaissance, excessive autonomy, resource use
Audit Metadata
Analyzed At
Mar 6, 2026, 09:39 PM
Package URL
pkg:socket/skills-sh/DevelopersCoffee%2Fjava-cwe-security-skills%2Fcwe-113-http-response-splitting%2F@3d725623f2906fa82676914c46d455656052d6f5