performing-wireless-network-penetration-test

Warn

Audited by Socket on Mar 15, 2026

2 alerts found:

Securityx2
SecurityMEDIUM
references/workflows.md

This file is a procedural workflow that documents active and passive wireless attack techniques capable of causing denial-of-service, credential theft, unauthorized network access, and lateral movement. There is no embedded executable code or obfuscated payloads, but the operational instructions are high-risk if used without explicit authorization. Treat as sensitive dual-use documentation: acceptable within authorized testing contexts, potentially illegal and dangerous in general use. Review and control distribution; include legal/ethical usage guidance if retained in repositories.

Confidence: 75%Severity: 85%
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the skill is internally consistent as a wireless pentest playbook, but it gives an AI agent high-risk offensive security capabilities including credential harvesting, rogue AP creation, deauthentication, and password cracking. Tool provenance looks largely legitimate, so the main concern is the dangerous exploit-oriented scope rather than hidden exfiltration or deceptive install behavior.

Confidence: 94%Severity: 90%
Audit Metadata
Analyzed At
Mar 15, 2026, 10:50 PM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fperforming-wireless-network-penetration-test%2F@8c44b39b1f9db044594cab1cca45b8a1a35884fe