exploiting-template-injection-vulnerabilities

Fail

Audited by Socket on Mar 15, 2026

2 alerts found:

SecurityObfuscated File
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the skill is internally consistent as an offensive pentesting guide, but its actual footprint is high risk because it equips an AI agent to exploit SSTI/CSTI, achieve RCE, extract files/secrets, and use third-party tooling with credentials against live targets. This belongs to a narrow authorized-security context only and is unsafe as a general-purpose agent skill.

Confidence: 95%Severity: 92%
Obfuscated FileHIGH
references/api-reference.md

The fragment documents an active SSTI detection/exploitation agent that intentionally sends engine-specific template payloads and includes explicit RCE and secret-exfiltration payloads. This is dual-use tooling: appropriate for authorized security assessments but dangerous if used without permission. No obfuscation or embedded C2 infrastructure is present in the specification, but the absence of operational safeguards (consent checks, safe-mode) increases the risk of misuse. Treat this package as high-impact offensive tooling; require explicit authorization and auditing before use.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 15, 2026, 09:40 PM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fexploiting-template-injection-vulnerabilities%2F@4c4e518ecae77e0c23a622f80e7006efe1445a12