android-pentest

Fail

Audited by Socket on Apr 21, 2026

7 alerts found:

Anomalyx4Malwarex3
AnomalyLOW
scripts/root_bypass.js

This code is a runtime hooking script designed to bypass Android root detection mechanisms. It does not perform network exfiltration or credential harvesting, but it intentionally falsifies system information and blocks root-detection checks so an application will believe the device is not rooted. As such it is a tool to subvert application security and should be considered malicious for the purpose of defeating app integrity checks. It is low-risk in terms of direct data theft but high-risk in terms of undermining app security models.

Confidence: 90%Severity: 60%
AnomalyLOW
setup/magisk_module/service.sh

The script itself is not obfuscated and contains no direct backdoor code, but it performs high-risk operations: it can download and execute a native Frida server binary from the network without integrity checks, start a powerful instrumentation server bound to configurable addresses (default 0.0.0.0), and change system-wide proxy settings. Those behaviors present a moderate-to-high supply-chain/security risk if the module or its configuration is untrusted. If used in an environment where the module and downloaded assets are fully trusted and controlled (e.g., a lab), the behavior is explainable; in production or on user devices it is dangerous. Recommend only using this module in controlled environments, adding verification of downloaded binaries (checksums/signatures), and restricting listen address and proxy configuration.

Confidence: 80%Severity: 60%
AnomalyLOW
setup/docker/scripts/setup-emulator.sh

This script is not obfuscated and appears intended for legitimate pentesting/emulator configuration (install and run Frida, add CA certs, set proxy). However it performs high-privilege actions without integrity checks: enabling root, remounting system, pushing and executing an arbitrary Frida binary, and installing arbitrary CA certificates into the system trust store and setting global proxy. Those actions can be abused if the FRIDA_SERVER binary or certificate files are malicious or come from untrusted sources. For trusted operator-controlled inputs this is acceptable; for untrusted inputs it is a moderate-to-high risk. Recommend verifying FRIDA_SERVER binaries (checksums/signatures), validating certificate provenance, and limiting certificate/proxy configuration to trusted files/environments.

Confidence: 90%Severity: 60%
AnomalyLOW
workflows/data_exfiltration.md

No explicit malware payload (e.g., network C2, backdoor persistence, or covert behavior) is present in the fragment; it reads as a dual-use Android security testing/dumping workflow. Nevertheless, it contains high-impact secret/PII harvesting capabilities: runtime interception that logs SharedPreferences values directly, comprehensive on-device artifact dumping with sensitive-pattern grep, explicit external-storage exposure checks, optional adb-backup export, and instrumentation guidance aimed at defeating/understanding SQLCipher encryption. Treat this as potentially dangerous in any context outside explicit authorization and controlled testing.

Confidence: 60%Severity: 68%
MalwareHIGH
workflows/ssl_pinning_bypass.md

This fragment is an explicitly malicious interception workflow that bypasses SSL pinning and coerces TLS certificate verification at both Java and native layers using Frida, with optional persistence and anti-detection steps. Its verification method (request bodies visible in Burp) strongly indicates intent to decrypt and intercept sensitive user/app traffic. In a supply-chain context, inclusion or distribution of such logic would represent a critical security threat and should be treated as unacceptable.

Confidence: 85%Severity: 100%
MalwareHIGH
workflows/auth_testing.md

Overall, this fragment describes an offensive Frida-based workflow that can bypass authentication/biometric controls, manipulate session handling, decode and log JWTs, and extract sensitive tokens/credential-related data from local storage. Even if labeled as “testing,” the concrete capability to steal/expose authentication material and subvert security controls presents a very high security risk if used outside a strictly authorized, controlled assessment environment. Confidence is moderate because the external injected scripts are not provided.

Confidence: 67%Severity: 92%
MalwareHIGH
workflows/complete_assessment.md

This fragment describes an end-to-end offensive assessment pipeline using Frida to bypass SSL and root protections, execute credential/crypto/intents hooking scripts, and extract app data (databases, prefs, storage, logcat) while capturing network traffic through a proxy. Such operations strongly align with credential theft and data exfiltration. While it may be presented as a MASTG-aligned assessment, the concrete capabilities and hooks (credential_hooks.js, SSL/root bypass, broad dumps, traffic interception) make it a high-risk malicious workflow. More context would be needed to determine whether it is strictly for authorized testing, but as a supply-chain/security payload it is dangerous.

Confidence: 86%Severity: 90%
Audit Metadata
Analyzed At
Apr 21, 2026, 01:34 AM
Package URL
pkg:socket/skills-sh/hardw00t%2Fai-security-arsenal%2Fandroid-pentest%2F@028a16f01aedcb1d68b9eae42af8d54d44ba76ae