memory-forensics

Fail

Audited by Socket on Apr 8, 2026

2 alerts found:

AnomalyMalware
AnomalyLOW
sub-skills/virtual-machine-memory.md

No direct malware or covert behavior is evident; the snippet is documentation/instructions for dumping VM memory using standard hypervisor tools. However, it performs a highly sensitive, dual-use action (capturing raw memory snapshots that may contain secrets). Treat the capability and resulting artifacts (memory.raw/memory.elf) as high-risk and ensure strict authorization, secure storage, and controlled access to dumps.

Confidence: 60%Severity: 58%
MalwareHIGH
sub-skills/credential-extraction.md

The provided fragment is an explicit credential-dumping workflow that instructs extraction of highly sensitive authentication data (hashes, LSA secrets, cached domain credentials) from a Windows memory image using Volatility. While no network exfiltration or persistence is visible in this snippet alone, the operational intent and chosen plugin actions strongly align with credential theft and are high risk if shipped as part of a software supply chain (e.g., scripts/docs in a dependency).

Confidence: 74%Severity: 82%
Audit Metadata
Analyzed At
Apr 8, 2026, 02:13 PM
Package URL
pkg:socket/skills-sh/Dokhacgiakhoa%2Fantigravity-ide%2Fmemory-forensics%2F@18080ae6da4035df3472f049514afe8f1ea4837f