implementing-runtime-security-with-tetragon

Pass

Audited by Socket on Apr 20, 2026

Checks
Malicious behaviorInjection, exfiltration, untrusted installs
Security concernsCredential exposure, tool/trust exploitation
Code obfuscationHidden or obfuscated code
Suspicious patternsReconnaissance, excessive autonomy, resource use
Audit Metadata
Analyzed At
Apr 20, 2026, 11:34 PM
Package URL
pkg:socket/skills-sh/mukul975%2Fanthropic-cybersecurity-skills%2Fimplementing-runtime-security-with-tetragon%2F@6d813b0c918473e96c58aa13ca09e54c07cc4b09