performing-cloud-penetration-testing-with-pacu

Fail

Audited by Socket on Mar 15, 2026

2 alerts found:

Obfuscated FileSecurity
Obfuscated FileHIGH
scripts/agent.py

This module is a legitimate AWS penetration-testing helper that performs sensitive enumeration (IAM, policies, Secrets Manager/SSM) and delegates powerful actions to external Pacu modules. The file itself does not contain obfuscated or overtly malicious code or hardcoded secrets. However, because it uses environment-sourced AWS credentials and executes third-party Pacu modules without sandboxing or integrity checks, running it with real or high-privilege credentials in an untrusted environment poses a meaningful risk of data exposure, privilege escalation, or resource modification. Treat this script as dangerous in production; only run in authorized, controlled test environments with least-privilege credentials and audited execution.

Confidence: 98%
SecurityMEDIUM
SKILL.md

Purpose and capabilities are internally consistent for an authorized AWS red-team skill, and the Pacu install path appears legitimate. However, this is still a high-risk offensive-security skill because it equips the agent to exploit AWS permissions, access sensitive data, and use real credentials through a third-party CLI; overall it is best classified as suspicious/high-risk rather than benign or confirmed malware.

Confidence: 91%Severity: 83%
Audit Metadata
Analyzed At
Mar 15, 2026, 10:51 PM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fperforming-cloud-penetration-testing-with-pacu%2F@65f2d751cc4d83612d76d8acada61b4a73bfa8f0