collecting-volatile-evidence-from-compromised-host

Warn

Audited by Socket on Apr 17, 2026

1 alert found:

Anomaly
AnomalyLOW
scripts/agent.py

This module is a dual-use incident-response/live-response data collection tool that executes a fixed set of OS interrogation commands and writes the resulting (potentially highly sensitive) host state to local files and a JSON manifest. In this fragment there is no evidence of malware behaviors such as exfiltration, persistence, or credential theft; however, its broad reconnaissance capability (process/network/users/routing/DNS/tasks) makes it a security-sensitive component that should be controlled, permissioned, and confined to authorized use.

Confidence: 72%Severity: 52%
Audit Metadata
Analyzed At
Apr 17, 2026, 10:08 AM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fcollecting-volatile-evidence-from-compromised-host%2F@eebfb7b9fc48ce3481d56464be733d4ff94d8cfc