extracting-credentials-from-memory-dump
Warn
Audited by Socket on Apr 6, 2026
1 alert found:
SecuritySecuritySKILL.md
MEDIUMSecurityMEDIUM
SKILL.md
SUSPICIOUS: the skill is internally consistent as a credential-forensics guide, but its actual footprint is a high-risk offensive capability for an AI agent: extracting hashes, passwords, tickets, tokens, and cloud credentials from memory. Install sources are mostly legitimate and local data stays local in the examples, so this is not confirmed malware, but it is a dangerous skill that materially enables credential theft/abuse if misused.
Confidence: 93%Severity: 88%
Audit Metadata