ios-pentest

Fail

Audited by Socket on Feb 26, 2026

5 alerts found:

Securityx2AnomalyMalwareObfuscated File
SecurityMEDIUM
scripts/ssl_pinning_bypass.js

The code is an active SSL/TLS pinning bypass implemented as a Frida script. It purposefully disables or overrides many trust checks across multiple libraries and APIs so that the host app will accept arbitrary/untrusted certificates. This enables interception of encrypted network traffic (MITM). While useful for security testing, it is dangerous if executed on targets without explicit authorization. No direct data exfiltration or persistence code is present in this fragment, but the bypass itself is a high-risk action for confidentiality and integrity of network communications.

Confidence: 90%Severity: 80%
AnomalyLOW
scripts/jailbreak_bypass.js

This Frida script actively subverts iOS jailbreak/root detection and blocks process creation/command execution while hiding instrumentation-related dylibs. It does not itself exfiltrate data or install a persistent backdoor, but it is an evasion/anti-analysis tool that alters app behavior and undermines security checks. Use of this code in a production app would be malicious with respect to app integrity and security; in a testing context it may be legitimate. Review and control deployment context carefully.

Confidence: 90%Severity: 60%
MalwareHIGH
SKILL.md

The skill description is purpose-aligned and coherent: it documents legitimate iOS pentesting workflows using Frida/Objection, with standard install sources and device interaction steps. While it exposes capabilities that could bypass security controls and access sensitive data during authorized assessments, these are typical for a penetration tester performing OWASP MASTG-compliant evaluations. The overall risk is elevated due to the high-privilege actions enabled (SSL pinning bypass, jailbreak detection bypass, keychain/data dumps, IPA patching), but within a properly scoped engagement this aligns with the stated purpose. Recommend ensuring explicit authorization, defined scope, and access controls for usage to mitigate potential abuse.

Confidence: 95%Severity: 90%
SecurityMEDIUM
scripts/biometric_bypass.js

This Frida script is a deliberate runtime biometric bypass: it forces LAContext and keychain-related APIs to report success and makes the app believe biometric capabilities exist. It does not itself exfiltrate data or reach out over the network, but it effectively disables a critical security control and enables local access to protected app functionality and secrets. Use only in authorized testing contexts; treat presence of this script or its effects as a high-severity security incident if observed in production environments.

Confidence: 75%Severity: 80%
Obfuscated FileHIGH
scripts/keychain_hooks.js

This Frida script intentionally intercepts and logs keychain API usage and contents. It will disclose sensitive keychain metadata and stored data to the Frida operator (console). The code is not remotely exfiltrating on its own, but it enables credential harvesting when run by someone with instrumentation access. Use in production or on devices with sensitive credentials is high-risk if run by untrusted parties. The code itself does not appear obfuscated or self-elevating, but it does suppress some errors which could hide failures.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 26, 2026, 02:36 PM
Package URL
pkg:socket/skills-sh/hardw00t%2Fai-security-arsenal%2Fios-pentest%2F@ecdc2fa24add11d4c60a83fc33715c6ff0de2a97