Broken Authentication Testing

Fail

Audited by Socket on Mar 4, 2026

2 alerts found:

MalwareObfuscated File
MalwareHIGH
sub-skills/phase-5-credential-stuffing.md

This fragment is a high-risk, actionable guide for credential stuffing attacks and includes explicit operational security advice to avoid detection. It should be treated as malicious content: do not use or execute these instructions without explicit, documented authorization from the target owner. Defenders should monitor for described indicators (matched login attempts, slow low-and-slow patterns, diverse IPs with consistent credential pairs) and treat leaked credential replay attempts as high-priority incidents.

Confidence: 95%Severity: 95%
Obfuscated FileHIGH
sub-skills/example-3-password-reset-token-exploitation.md

This document is an actionable test/attack plan targeting password reset flows. It presents realistic techniques (token reuse/modification, email parameter manipulation, brute-force/rate-limit evasion) that could enable account takeover if a web application is implemented insecurely. It should be used only by authorized testers; defenders should verify reset tokens are unpredictable, single-use, tied to the correct account server-side, and protected by rate-limiting, logging, and MFA for high-value accounts. No malicious code or obfuscation is present, but the plan's operational guidance increases the security risk if used maliciously.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 4, 2026, 02:10 PM
Package URL
pkg:socket/skills-sh/Dokhacgiakhoa%2Fantigravity-ide%2Fbroken-authentication-testing%2F@de54921f736d84f5e19f6fc16ae55104f125c3df