ctf-pwn

Fail

Audited by Socket on Apr 17, 2026

3 alerts found:

Securityx2Malware
SecurityMEDIUM
rop-and-shellcode.md

This fragment is clearly offensive exploitation content (pwntools/ROP/shellcode) intended to hijack control flow and spawn shells via execve/system or raw syscalls, including advanced constraint-bypass techniques (XOR encoding, gadget workarounds, stack pivoting, CSU/canary gadget abuse). It shows no supply-chain malware mechanics like stealth persistence or exfiltration within the provided code, but it would be extremely risky to distribute as an installable dependency due to its direct capability to enable unauthorized code execution in targets. Treat as a high-risk weaponizable artifact, with only moderate confidence about any real supply-chain impact because install/runtime context is not shown.

Confidence: 70%Severity: 80%
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the skill is internally consistent as a CTF pwn guide and uses mostly legitimate install sources, but it equips an AI agent with high-risk offensive exploitation capabilities, including code execution and privilege escalation workflows. Main risk comes from enabling autonomous exploit activity, not from credential theft or deceptive data flows.

Confidence: 93%Severity: 86%
MalwareHIGH
kernel-bypass.md

This document is a practical kernel exploit guide and PoC for local Linux privilege escalation. It contains actionable techniques to leak kernel pointers, compute KASLR/FGKASLR offsets, construct kernel ROP chains calling prepare_kernel_cred/commit_creds, bypass KPTI/SMEP/SMAP, and regain userland control or persist via modprobe_path/core_pattern. It should be treated as high-risk, potentially malicious content: use only in authorized testing/CTF environments and never on production systems.

Confidence: 75%Severity: 90%
Audit Metadata
Analyzed At
Apr 17, 2026, 12:13 PM
Package URL
pkg:socket/skills-sh/ljagiello%2Fctf-skills%2Fctf-pwn%2F@b66094f806c9a00161718cb4933b121861620fa8