conducting-man-in-the-middle-attack-simulation

Warn

Audited by Socket on Mar 15, 2026

3 alerts found:

AnomalySecurityx2
AnomalyLOW
scripts/agent.py

This module implements active MITM behavior (ARP poisoning) and passive network sniffing with report generation. The code is not obfuscated and contains no obvious hidden exfiltration, but it includes dangerous functionality that can perform unauthorized interception and alteration of LAN traffic if executed with sufficient privileges. Use only in authorized testing environments. Safeguards (consent checks, privilege checks, explicit warnings) are missing and TLS verification is disabled in one check. The code is dual-use: potentially legitimate for security testing but high risk if misused or included inadvertently.

Confidence: 90%Severity: 60%
SecurityMEDIUM
references/api-reference.md

This module provides powerful MITM capabilities (ARP spoofing, network discovery, packet sniffing) that are inherently dangerous and dual-use. In an authorized lab or pentest with explicit consent, it is a valid testing tool. However, as a public dependency, it poses a significant abuse risk because it can be used to intercept credentials, perform network reconnaissance, and redirect traffic. Use should be restricted to controlled environments, and the package should include strong safeguards (consent checks, logging, scope limits, explicit warnings) and clear handling policies for captured data.

Confidence: 90%Severity: 85%
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the skill is internally consistent with its stated purpose, but that purpose is to give an AI agent offensive MITM and credential-interception capabilities. Official tool provenance lowers supply-chain concern, yet the overall footprint remains high risk because it disables TLS checks, captures credentials/cookies, manipulates live network traffic, and includes phishing infrastructure.

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Mar 15, 2026, 09:05 AM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fconducting-man-in-the-middle-attack-simulation%2F@1be1d0577bc693a3925f08c79ebad4074a8bbd6b