Pentest Commands

Fail

Audited by Socket on Mar 4, 2026

6 alerts found:

Obfuscated Filex2Securityx3Malware
Obfuscated FileHIGH
sub-skills/1-nmap-commands.md

The snippet is an explicit set of Nmap command examples for active reconnaissance and vulnerability checking. It does not contain obfuscated or embedded malware, hard-coded credentials, or exfiltration mechanisms, but it demonstrates intrusive and potentially disruptive actions (exploit checks and brute-force). Use of these commands against unauthorized targets can be illegal and operationally harmful. Treat the commands as high-risk operational activities that require authorization, caution, and safeguards.

Confidence: 98%
SecurityMEDIUM
sub-skills/7-aircrack-ng-commands.md

The snippet is an operational guide to perform active Wi‑Fi attacks (deauthentication) and offline WPA cracking. It does not contain hidden obfuscation, exfiltration, or hardcoded secrets, but it explicitly describes harmful actions that, if executed without authorization, are illegal and can harm third parties. Treat as high-risk operational instructions: allowed only in authorized testing environments with consent.

Confidence: 75%Severity: 90%
MalwareHIGH
sub-skills/2-metasploit-commands.md

The fragment is an explicit, actionable set of offensive cyber operation commands showing how to scan networks, exploit widely-known vulnerabilities, brute-force credentials, generate payloads, and receive reverse shells. It is high-risk content: usable directly to compromise systems and unsuitable for inclusion in benign open-source packages or public-facing documentation without strong contextualization (legal/ethical safeguards, defensive framing). Treat this as potentially malicious operational guidance; distribution or use against systems without explicit authorization is unlawful and dangerous.

Confidence: 80%Severity: 90%
SecurityMEDIUM
sub-skills/4-sqlmap-commands.md

This snippet is an explicit guide to performing SQL injection attacks and post-exploitation actions (data exfiltration and obtaining an OS shell) using sqlmap. It presents a high security risk if used without proper authorization. The file itself is not obfuscated and does not include embedded malware, but its contents provide clear, actionable steps to compromise remote systems. Treat presence of this file in a codebase as a potential red flag: verify intent, ensure appropriate authorization is documented, and remove or restrict such material in production or public repositories.

Confidence: 85%Severity: 90%
SecurityMEDIUM
sub-skills/5-hydra-commands.md

This file is an explicit, high-risk recipe for automated credential-guessing across multiple protocols using hydra. It contains clear instructions that, if executed against systems without explicit authorization, would constitute malicious activity (unauthorized access attempts). The content is not obfuscated and contains no embedded secrets, but it materially enables attack behavior. Treat as dangerous instructional artifact: permissible only within authorized testing scopes; otherwise avoid executing and consider removing/disallowing distribution in contexts where misuse is likely.

Confidence: 90%Severity: 90%
Obfuscated FileHIGH
SKILL.md

This package is a documentation skill that centralizes powerful offensive tool commands and workflows. The fragment itself contains no executable malicious code, obfuscation, or embedded network callbacks, but it meaningfully lowers the barrier to performing intrusive operations. Risk arises from actionable content and transitive references to unreviewed sub-skill files. Use only in controlled, authorized environments; restrict execution privileges and audit all referenced materials before use.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 4, 2026, 02:06 PM
Package URL
pkg:socket/skills-sh/Dokhacgiakhoa%2Fantigravity-ide%2Fpentest-commands%2F@7939e75a1c1ae0f9844aedb894f63a8b95f4bdcc