conducting-full-scope-red-team-engagement
Audited by Socket on Mar 15, 2026
2 alerts found:
SecurityMalwareSUSPICIOUS: the skill’s purpose is coherent, but it is inherently high risk because it equips an AI agent with offensive security capabilities, credential-theft workflows, and exfiltration paths. Multiple commands route privileged credentials into external tools, and several referenced binaries/scripts are not verifiably sourced, raising supply-chain and credential-harvesting risk beyond a normal documentation skill.
This document is an explicit offensive red team engagement playbook providing actionable TTPs (phishing, credential theft, privilege escalation, persistence, exfiltration) and tooling recommendations commonly used in real-world intrusions. It is not obfuscated code but contains high-risk, adversarial guidance that could be misused. If found in a public package or dependency, it represents a significant security and abuse risk and should be treated with caution: ensure presence is intended (e.g., part of a sanctioned training repo) and restrict distribution. For supply-chain concerns, inclusion of this content increases likelihood of misuse even though it is not executable malware by itself.