conducting-internal-network-penetration-test

Fail

Audited by Socket on Mar 16, 2026

2 alerts found:

Obfuscated FileSecurity
Obfuscated FileHIGH
scripts/agent.py

This module is an offensive, dual-use pentest helper: it performs active port probes, calls nmap, and can enumerate AD using credentials supplied by the operator. I found no indicators of covert malware (no C2, no obfuscated payloads, no reverse shell logic). The main security risks are misuse and sensitive-data leakage: the script accepts plaintext AD credentials and may persist enumeration results to disk or stdout without redaction, and it explicitly recommends using Responder (an active credential-capture tool). Treat as a tool for authorized testing only; do not run in production or with real credentials unless permitted. Add safeguards: confirmatory prompts before high-risk actions, avoid writing credentials to disk, sanitize reports, and document intended usage and authorization requirements.

Confidence: 98%
SecurityMEDIUM
SKILL.md

SUSPICIOUS. The skill is internally coherent as a pentesting playbook, but it equips an AI agent with offensive intrusion, credential-harvesting, and privilege-escalation procedures that can materially compromise real networks. The main risk is not deceptive install behavior; it is the explicit enablement of high-impact security/exploit operations by an agent.

Confidence: 94%Severity: 96%
Audit Metadata
Analyzed At
Mar 16, 2026, 07:57 AM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fconducting-internal-network-penetration-test%2F@03913c539f8edec23a16031519c8bd72a9f6117e