SMTP Penetration Testing

Fail

Audited by Socket on Feb 16, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] This skill is an explicit SMTP penetration-testing playbook and is internally consistent with its stated purpose. It contains standard, powerful offensive techniques (user enumeration, open-relay exploitation, brute-force authentication) that are dual-use and present a high abuse risk if used without strict authorization and controls. There is no evidence of obfuscated or hidden malicious code, no strange third-party exfiltration endpoints, and no embedded secrets. Verdict: the content is SUSPICIOUS in context because of high potential for misuse (but not malware). Use only with verified written authorization, logging, rate-limiting, and legal oversight. LLM verification: This document is a complete, practical SMTP penetration-testing playbook that correctly maps procedures to tools and SMTP protocol features. There is no evidence in the provided text of embedded malware, obfuscation, or covert exfiltration. The main concern is dual-use: the instructions enable intrusive testing (enumeration, brute force, open-relay exploitation) that may be illegal or harmful if used without explicit authorization. Operators should only use these procedures with written permissi

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 16, 2026, 10:10 AM
Package URL
pkg:socket/skills-sh/jpropato%2Fsiba%2Fsmtp-penetration-testing%2F@b4a7a95437be55f94eeedb284aafc52bd305d3e1