Cybercentry Web Application Verification

Fail

Audited by Socket on Feb 21, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Natural language instruction to download and install from URL detected All findings: [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] [CRITICAL] command_injection: Natural language instruction to download and install from URL detected (CI009) [AITech 9.1.4] This file is a legitimate-sounding documentation and examples pack for a paid web/dApp frontend scanning service. There is no embedded malware or obfuscated code. The primary security issues are user-guidance and operational: examples that show sending session cookies and use of local proxies can lead to credential exposure; lack of guidance for secure installation (pinned releases/signatures) increases supply-chain risk; and indefinite retention of submitted URLs/reports increases data exposure risk if sensitive information is accidentally submitted. Treat authenticated-scan usage with caution: use ephemeral/test credentials, avoid sending real session cookies, verify the ACP client and Cybercentry wallet address before payment, and consider data retention/privacy implications before submitting URLs. LLM verification: This SKILL.md describes a plausible OWASP-based web/dApp frontend scanning service and its usage via the ACP marketplace. The documentation is generally coherent with its stated purpose, but there are moderate supply-chain and data-exposure risks: (1) it instructs installation from GitHub and running npm install without pinned versions or integrity checks, (2) it provides an authenticated-scan example that directly asks users to include session cookies/credentials (a disproportionate and risky p

Confidence: 98%Severity: 90%
Audit Metadata
Analyzed At
Feb 21, 2026, 06:17 AM
Package URL
pkg:socket/skills-sh/openclaw%2Fskills%2Fcybercentry-web-application-verification%2F@0fa5b15b4f4cacefeff17687c35157e818e0fb48