conducting-full-scope-red-team-engagement
Audited by Socket on Apr 8, 2026
2 alerts found:
SecurityMalwareThis skill is internally consistent with its stated purpose, but that purpose is to enable end-to-end offensive red-team operations. It equips an AI agent with high-risk exploit, credential theft, lateral movement, and exfiltration procedures, so it should be classified as high security risk even without clear evidence of hidden malware or deceptive supply-chain behavior.
This document is an explicit offensive red team engagement playbook providing actionable TTPs (phishing, credential theft, privilege escalation, persistence, exfiltration) and tooling recommendations commonly used in real-world intrusions. It is not obfuscated code but contains high-risk, adversarial guidance that could be misused. If found in a public package or dependency, it represents a significant security and abuse risk and should be treated with caution: ensure presence is intended (e.g., part of a sanctioned training repo) and restrict distribution. For supply-chain concerns, inclusion of this content increases likelihood of misuse even though it is not executable malware by itself.