session-reader

Pass

Audited by Socket on May 9, 2026

Checks
Malicious behaviorInjection, exfiltration, untrusted installs
Security concernsCredential exposure, tool/trust exploitation
Code obfuscationHidden or obfuscated code
Suspicious patternsReconnaissance, excessive autonomy, resource use
Audit Metadata
Analyzed At
May 9, 2026, 07:11 PM
Package URL
pkg:socket/skills-sh/HazAT%2Fpi-config%2Fsession-reader%2F@f5ace954306b9b2b0599371ed53b43d491c77b71