building-c2-infrastructure-with-sliver-framework

Fail

Audited by Socket on Mar 16, 2026

5 alerts found:

Obfuscated Filex2Securityx2Malware
Obfuscated FileHIGH
references/api-reference.md

This fragment is an API/CLI reference for the Sliver C2 framework describing how to generate implants, configure listeners, and perform post-exploitation actions. The text itself is non-executable documentation but documents clear offensive capabilities (remote code execution, DLL sideloading, shell access, file transfer, proxying) that, if implemented, present significant security risks. Treat any corresponding implementation, binaries, or packages as high-risk: they should only be used in authorized red-team or controlled lab environments, and code/artifacts should be audited before inclusion in a supply chain or production environment.

Confidence: 98%
SecurityMEDIUM
scripts/agent.py

This Python module is a dual-use automation wrapper for the Sliver C2 client. The code itself is straightforward and not obfuscated, contains no embedded credentials, and uses subprocess.run safely with argument lists. However, it explicitly orchestrates offensive actions (implant/beacon generation and listener configuration) by delegating to an external C2 binary. The file should be treated as high-risk when present in an environment because running it will likely produce backdoor artifacts and active listeners via the external 'sliver-client'. If you are auditing dependencies, consider flagging this file as sensitive/blocked by policy unless used within an authorized red-team/pen-testing context and executed in isolated infrastructure.

Confidence: 80%Severity: 80%
Obfuscated FileHIGH
assets/template.md

This document is a non-executable configuration/template designed to plan and record deployment of Sliver C2 infrastructure. The file itself is not malware, contains no obfuscation or hard-coded secrets, but it explicitly facilitates deployment of offensive remote-access infrastructure. It is high-risk if used by unauthorized actors. Treat occurrences as sensitive: validate authorization, and if filled-in deployments exist, perform a security audit of the configured endpoints, certificate/key handling, and operator access mechanisms.

Confidence: 98%
SecurityMEDIUM
SKILL.md

This skill is internally consistent with its stated purpose, but that purpose is to equip an AI agent with C2 and post-exploitation capability. The only installer appears to be official BishopFox infrastructure, so malware confidence stays below confirmed-malicious levels, but the skill is still high risk because it enables offensive operations, includes TLS-verification disabling guidance, and extends trust to additional modules.

Confidence: 94%Severity: 93%
MalwareHIGH
references/workflows.md

This document is a high-confidence operational playbook for deploying and operating a C2 infrastructure (Sliver) and managing implants for post-exploitation. It provides explicit, actionable guidance to generate and deploy implants, evade detection, and maintain resilient covert channels for remote control and data exfiltration. The artifact itself is not executable code but materially enables severe malicious activity if used against unauthorized targets. Treat any associated code, operator config files, or generated implants as high-risk; protect or remove such artifacts from trusted supply chains and perform in-depth review of any binaries or scripts produced following these instructions.

Confidence: 85%Severity: 95%
Audit Metadata
Analyzed At
Mar 16, 2026, 02:50 AM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fbuilding-c2-infrastructure-with-sliver-framework%2F@7e44fe39cce9727571b55fb059b6f05e7d8ec272