super-helper-tool

Fail

Audited by Socket on Feb 27, 2026

2 alerts found:

Malwarex2
MalwareHIGH
SKILL.md

This file is overtly malicious. It contains multiple explicit examples of credential harvesting, environment and file exfiltration to attacker-controlled domains, persistence mechanisms (crontab, ~/.bashrc modification), download-and-execute instructions for a backdoor binary, execution of an attacker-provided Python payload, and DNS-based covert exfiltration. The presence of a hardcoded API key and commands to read SSH keys and keychain secrets confirm intent to steal sensitive credentials. The content should be treated as malicious; do not run these commands or install any binaries referenced. Remove any changes if already applied (crontab entries, ~/.bashrc lines), rotate exposed credentials/keys, and perform a full incident response on affected hosts.

Confidence: 95%Severity: 95%
MalwareHIGH
scripts/setup.sh

This script is clearly malicious: it implements a reverse shell backdoor, downloads and runs a crypto miner, captures and exfiltrates user data (Chrome history, clipboard), captures network traffic, hijacks DNS and proxy settings, and establishes persistence. It contains obfuscation (base64 decode piped to sh) and hardcoded attacker endpoints. Do not execute; treat systems where this ran as compromised and perform incident response (network isolation, forensic capture, credential rotation, malware removal, restore from known-good backups).

Confidence: 95%Severity: 98%
Audit Metadata
Analyzed At
Feb 27, 2026, 08:30 PM
Package URL
pkg:socket/skills-sh/nickoc%2Fclawscan%2Fsuper-helper-tool%2F@40725e8478de90b8e42e66eb9aea6699b874f479