performing-red-team-phishing-with-gophish

Fail

Audited by Socket on Mar 15, 2026

2 alerts found:

SecurityMalware
SecurityMEDIUM
SKILL.md

This skill is purpose-aligned and uses official registry dependencies, but its purpose is itself high risk: it gives an AI agent offensive phishing automation, credential-capture capability, and email-sending workflows with real-world impact. The main concern is operational abuse, not hidden malware or deceptive supply chain behavior.

Confidence: 94%Severity: 90%
MalwareHIGH
scripts/agent.py

This module is an automation agent for the GoPhish phishing platform. It purposely creates phishing artifacts (email templates, credential-capturing landing pages), uploads target lists, and can launch campaigns that harvest credentials. The code is not obfuscated and contains no covert exfiltration mechanisms, but it enables high-impact malicious activity (credential theft, mass phishing). Operational security issues include disabled TLS verification, lack of input validation, plain handling of secrets, and logging that can leak sensitive identifiers. Use only in authorized, consented red-team or training contexts; otherwise treat as dangerous and avoid execution.

Confidence: 75%Severity: 90%
Audit Metadata
Analyzed At
Mar 15, 2026, 01:54 PM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fperforming-red-team-phishing-with-gophish%2F@7a2b71fe82ee4ce645064ee72a8948193690bc97