conducting-social-engineering-pretext-call

Fail

Audited by Socket on Mar 15, 2026

4 alerts found:

Securityx2Malwarex2
SecurityMEDIUM
references/api-reference.md

This document is high risk: it is an operational manual for socially engineering targets via programmatic telephony and explicitly contemplates collecting credentials and measuring campaign success. It is not technical malware but enables harmful human-targeted attacks when paired with the referenced APIs and templates. Mitigations include strict access controls, removing operational playbooks from general repos, requiring documented legal authorization, and introducing technical safeguards around data capture, storage, and automated execution.

Confidence: 90%Severity: 80%
MalwareHIGH
scripts/agent.py

This module is intentionally malicious: it is a social-engineering pretext call planner whose templates explicitly instruct soliciting passwords, MFA codes, admin credentials, and coercing financial transfers. While it contains no obfuscated code, network connections, or technical exploits, its functionality directly facilitates fraud and credential theft and thus constitutes a high-risk malicious artifact. Do not include this code in libraries or share it in software supply chains; remove and treat as malicious tooling.

Confidence: 90%Severity: 95%
SecurityMEDIUM
SKILL.md

High-risk offensive security skill. Its behavior matches its stated red-team purpose, but that purpose is to conduct vishing and collect sensitive information from real people. Install trust is relatively low concern, but the social-engineering and credential-harvesting capability makes the skill dangerous despite the authorization framing.

Confidence: 94%Severity: 90%
MalwareHIGH
references/workflows.md

This artifact is a high-risk operational playbook for conducting vishing-based social engineering campaigns. It contains actionable, role-tailored pretexts (including CEO/wire-transfer fraud), normalization of caller ID spoofing, and measurement-driven optimization of deception. The document enables financial fraud, unauthorized access, and privacy violations. If found in code or project repositories, treat as malicious or highly suspicious content: remove, audit repository history, identify authors, and verify legitimate authorized testing scope before any use.

Confidence: 75%Severity: 95%
Audit Metadata
Analyzed At
Mar 15, 2026, 09:05 AM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fconducting-social-engineering-pretext-call%2F@6013b2f0c26de1ad828254b9abe2ac269d5e924d