safety-filter-bypass
Audited by Socket on Feb 16, 2026
1 alert found:
Malware[Skill Scanner] Detected jailbreak/DAN attempt This package/file is a high-risk, dual-use tool: it intentionally documents and implements practical evasion techniques and provides simple automation to test filters. The implementation is clear and non-obfuscated, which lowers supply-chain stealth concerns but increases ease-of-abuse. Absent programmatic safeguards (authorization enforcement, target allowlists, rate-limiting, telemetry/audit), this code should not be published or executed in untrusted environments. It is acceptable only within controlled, authorized security-testing contexts with legal approval, logging, and operational controls. No direct malware found, but the functionality significantly raises the chance of misuse. LLM verification: The code is an enabler for safety-filter evasion: no direct malicious operations (no OS/network code inside this fragment, no credentials), but it implements immediate, effective evasion techniques and integrates with jailbreaking-related tooling. This makes it high-risk if deployed without strict controls. Recommend restricting use to authorized test environments, auditing filter_api implementations, and adding runtime safeguards (auth, rate limits, logging, allowlists).