executing-red-team-exercise
Audited by Socket on Mar 15, 2026
2 alerts found:
SecurityAnomalySUSPICIOUS/HIGH-RISK. The skill is internally coherent as a red-team guide, but it equips an AI agent to conduct offensive operations: phishing, credential theft, stealthy C2, evasion, lateral movement, and exfiltration. There is no clear sandboxing or enforced approval mechanism, so the main issue is dangerous offensive capability, not supply-chain deception.
This package is a dual-use red-team planning utility that downloads MITRE ATT&CK STIX data, maps techniques for an emulated actor, and generates operation plans. The code as described does not itself perform exploitation or exfiltration, nor does it exhibit obfuscation. Primary concerns are: (1) supply-chain risk from downloading live JSON without integrity checks, and (2) the potential for misuse because it produces detailed operational plans. Apply integrity verification, add usage controls/auditing, and treat generated outputs as sensitive.