exploiting-api-injection-vulnerabilities

Fail

Audited by Socket on Apr 6, 2026

2 alerts found:

SecurityMalware
SecurityMEDIUM
scripts/agent.py

This code is best classified as a high-risk active vulnerability probing/exploitation-assistance tool. It directly injects explicit SQL/NoSQL/command payloads (including potentially destructive SQL patterns) into attacker-supplied endpoints and uses error-string and time/response-size heuristics to infer vulnerability behavior. While it does not show classic malware behaviors (exfiltration/backdoor/persistence) in this snippet, its offensive request-generation capability and the insecure TLS setting (verify=False) make it dangerous in a supply-chain context unless strictly controlled for authorized testing only.

Confidence: 78%Severity: 78%
MalwareHIGH
SKILL.md

The skill is a high-risk offensive security capability for AI agents. Its stated purpose matches its behavior, but that behavior includes exploitation, data extraction, internal network access, and command execution on targets; this makes it suspicious and dangerous even with authorization language.

Confidence: 96%Severity: 97%
Audit Metadata
Analyzed At
Apr 6, 2026, 11:56 AM
Package URL
pkg:socket/skills-sh/mukul975%2Fanthropic-cybersecurity-skills%2Fexploiting-api-injection-vulnerabilities%2F@4cdafeb87de4e0acd3275566b768bfa729c222ce