performing-wireless-network-penetration-test
Audited by Socket on Mar 15, 2026
2 alerts found:
Securityx2This file is a procedural workflow that documents active and passive wireless attack techniques capable of causing denial-of-service, credential theft, unauthorized network access, and lateral movement. There is no embedded executable code or obfuscated payloads, but the operational instructions are high-risk if used without explicit authorization. Treat as sensitive dual-use documentation: acceptable within authorized testing contexts, potentially illegal and dangerous in general use. Review and control distribution; include legal/ethical usage guidance if retained in repositories.
SUSPICIOUS: the skill is internally consistent as a wireless pentest playbook, but it gives an AI agent high-risk offensive security capabilities including credential harvesting, rogue AP creation, deauthentication, and password cracking. Tool provenance looks largely legitimate, so the main concern is the dangerous exploit-oriented scope rather than hidden exfiltration or deceptive install behavior.