using-webctl

Warn

Audited by Socket on Mar 29, 2026

2 alerts found:

Anomalyx2
AnomalyLOW
SKILL.md

SUSPICIOUS: the skill's overall goal is coherent, and the base webctl install path is legitimate, but it uses an unusual local monkeypatch that intercepts authenticated proxy traffic and forwards proxy credentials through custom, unreviewed code. No clear third-party exfiltration is shown, so this is not confirmed malware, but the credential-handling patch and browser automation over untrusted web content make it a medium-risk skill.

Confidence: 82%Severity: 58%
AnomalyLOW
scripts/setup_webctl.py

This fragment is a high-impact installer/patcher that (a) installs a dependency at runtime with elevated pip behavior (--break-system-packages) and (b) overwrites and patches installed webctl package code in /usr/local/lib/python3.12/dist-packages, including authentication/session-related modules. No explicit malware actions are visible in the snippet (no exfiltration/C2 shown), but the supply-chain/tampering pattern is significant. Verify the provenance and contents of scripts/auth_proxy.py, and confirm the exact session_manager patch logic (old_block/new_block), since the fragment appears incomplete.

Confidence: 60%Severity: 65%
Audit Metadata
Analyzed At
Mar 29, 2026, 05:44 AM
Package URL
pkg:socket/skills-sh/oaustegard%2Fclaude-skills%2Fusing-webctl%2F@f5adad125bad5f68fbdf9e90d997410f5bee6563