exploiting-vulnerabilities-with-metasploit-framework

Warn

Audited by Socket on Mar 15, 2026

2 alerts found:

Securityx2
SecurityMEDIUM
references/api-reference.md

This file is instructional documentation for Metasploit usage and includes explicit steps to discover and exploit vulnerabilities, generate payloads, and perform post-exploitation actions. It is dual‑use: legitimate for authorized penetration testing but directly enables unauthorized compromise if misused. Notable issues: an insecure example credential, concrete offensive commands (hashdump, getsystem), and explicit reverse-shell payload construction. The fragment contains no obfuscated or hidden code; the threat is operational. Treat the document as high operational security risk and ensure it is used only in authorized testing contexts and that example credentials are replaced with secure practices.

Confidence: 75%Severity: 75%
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the skill is internally consistent, but its purpose is to give an AI agent offensive security and post-exploitation capability, including credential dumping and pivoting. There is no clear third-party credential harvesting or deceptive install chain, yet the operational risk is high because it enables exploitation of real systems.

Confidence: 93%Severity: 91%
Audit Metadata
Analyzed At
Mar 15, 2026, 01:52 PM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fexploiting-vulnerabilities-with-metasploit-framework%2F@bbedaa1fe4f25dae97bd8b6a1dbce1c9658ae1e9