reverse-engineer

Fail

Audited by Socket on Feb 18, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
sub-skills/common-patterns.md

The code displays multiple clear anti-analysis and obfuscation techniques (XOR masking, API name hashing, stack string assembly, anti-debugger check). These are strong indicators commonly associated with loaders, packers, and malware, though they are not definitive proof of malicious intent by themselves. Treat binaries containing these idioms as suspicious: perform dynamic analysis (sandboxing, monitored execution), inspect resolved API calls and subsequent behavior (network/file/process activity), and review provenance (signatures, source). If encountered in production-critical software with no legitimate reason for obfuscation, quarantine and deeper forensic review are warranted.

Confidence: 90%
Audit Metadata
Analyzed At
Feb 18, 2026, 06:11 PM
Package URL
pkg:socket/skills-sh/Dokhacgiakhoa%2Fantigravity-ide%2Freverse-engineer%2F@b3ecce9301eaf8ad204643d5f98264c75ccb0a53