performing-jwt-none-algorithm-attack

Fail

Audited by Socket on Mar 15, 2026

2 alerts found:

SecurityObfuscated File
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the skill is internally consistent, but its stated purpose is to equip an AI agent with offensive authentication-bypass capability against live targets. Install trust is relatively normal and there is no clear exfiltration, so this is not confirmed malware; however, the exploit automation makes it high security risk.

Confidence: 91%Severity: 84%
Obfuscated FileHIGH
references/api-reference.md

The described module is an explicit offensive/tooling utility to craft and test forged JWTs exploiting 'alg=none' acceptance and RS256->HS256 algorithm confusion. It enables automated probing of endpoints with forged tokens, which can facilitate authentication bypass and privilege escalation on vulnerable services. There are no hidden obfuscation or data-exfiltration behaviors evident in the fragment; however, its presence in a dependency or CI environment represents a meaningful security risk because it provides ready-made exploitation capabilities. Use should be restricted to authorized security testing contexts and isolated environments; inclusion in general-purpose dependencies or production CI workflows is ill-advised.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 15, 2026, 10:51 PM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fperforming-jwt-none-algorithm-attack%2F@f73c4807b045ea7e002192ab2ea4c00d314f79f9