soc-security-skills

Fail

Audited by Socket on Feb 28, 2026

4 alerts found:

Securityx2Obfuscated Filex2
SecurityMEDIUM
eval-cases/physical-sca-skill/eval-dpa-basic.md

This is not malicious code; it is a vulnerability assessment of an unprotected AES-128 hardware engine. The device is highly vulnerable to practical first-order DPA/CPA attacks targeting the first-round S-box output using a Hamming-weight or Hamming-distance leakage model. Expected trace counts are on the order of hundreds to low thousands for unprotected hardware with reasonable measurement equipment. Severity is HIGH/CRITICAL. Immediate mitigations: implement first-order masking and hiding, reduce the time the key resides in accessible registers, and perform TVLA followed by CPA testing to quantify leakage.

Confidence: 85%Severity: 80%
Obfuscated FileHIGH
eval-cases/kernel-security-skill/eval-iommu-config-review.md

The configuration exhibits notable isolation gaps for multi-tenant VFIO/SR-IOV: lack of PCIe switch-level ACS, lazy DMA mode, and ATS disabled collectively raise the risk of cross-VF DMA and TOCTOU exposures. SMMUv3 2-stage translation remains a strong isolation mechanism, but its effectiveness hinges on proper ACS, per-VF IOMMU grouping, and strict DMA paths. Recommended actions: enable ACS at the PCIe switch or enforce per-VF IOMMU domains, set iommu.strict=1, reconsider ATS activation, and validate per-tenant isolation at the IOMMU/group level. Consider verifying HTTU/PRI features and firmware compatibility for stronger boundaries.

Confidence: 92%
Obfuscated FileHIGH
eval-cases/physical-sca-skill/eval-comprehensive-sca-iso17825.md

Overall assessment indicates a mixed security posture: AES exhibits second-order leakage despite a first-order pass; ECDSA lacks masking on field arithmetic; RSA-4096 has partial data; and overall lab data supports grounded findings for multiple channels. Requires lab-validated assessments for non-assessed operations and mitigations aligned to ISO 17825 and FIPS 140-3 Level 4. Residual risk centers on second-order leakage and unassessed components, necessitating mitigations and formal certification evidence.

Confidence: 98%
SecurityMEDIUM
eval-cases/physical-sca-skill/eval-fault-injection-glitching.md

Findings: This ROM and platform present high-risk, practical attack surfaces for voltage-glitch fault injection. Primary finding: signature verification bypass via single-instruction skip of the boolean comparison/branch is a primary and realistic attack (attackClass: voltage-glitch). Secondary finding: inducing faults in the ECDSA P-256 scalar multiplication in the hardware crypto accelerator can enable DFA to recover the signing private key or produce forged/accepted signatures. Deterministic boot timing (~50ms), external VDD access, and lack of voltage/clock sensors and instruction redundancy make both attacks feasible with commodity lab equipment and a skilled attacker. Severity: CRITICAL for boot bypass and key compromise. Recommendations: add internal LDO/regulation for secure domain, implement voltage and clock glitch sensors with tamper response, add instruction-flow redundancy or dual independent verification of signatures, consider repeating signature checks and anti-rollback protections, and protect the private signing key/workflow to minimize impact of DFA. Research references: [FROM TRAINING] literature on ECC DFA (Biehl/Meyer/Müller) and practical voltage-glitch instruction-skip attacks.

Confidence: 85%Severity: 90%
Audit Metadata
Analyzed At
Feb 28, 2026, 06:28 AM
Package URL
pkg:socket/skills-sh/dtsong%2Fmy-claude-setup%2Fsoc-security-skills%2F@8a865a44844ea50c00ffa570a3cd4a0a5bd7d112