reverse-engineering
Audited by Socket on Apr 25, 2026
3 alerts found:
Securityx2MalwareThe skill is internally consistent with its stated reverse-engineering purpose and shows no direct credential theft or obvious exfiltration path, but it gives an AI agent powerful offensive security capabilities: exploit development, anti-debug bypass, SSL unpinning, hooking, memory dumping, and malware analysis. That makes it high security risk even without clear malicious intent.
This module is a dedicated Android DEX dumping/extraction tool. It reads arbitrary bytes from a target process’s memory and internal class loader structures (via reflection into non-public ART/Dalvik fields), validates candidate DEX headers, and writes recovered .dex blobs to /data/local/tmp for later retrieval. No direct network exfiltration or persistence is evident here, but the capability is intrinsically intrusive and strongly security-relevant, enabling code theft/analysis in scenarios where an attacker has already gained in-device execution.
This fragment is a high-risk offensive iOS security bypass and reverse-engineering reference. It explicitly demonstrates runtime manipulation of authentication validation, TLS trust evaluation (enabling SSL/TLS validation bypass), and jailbreak-detection checks, and it provides mechanisms/guidance to inspect/dump keychain contents via Security framework interception. Although no hidden network exfiltration is shown in the fragment itself, the capabilities are directly usable for unauthorized compromise and credential/secret harvesting in the context of instrumented targets. Treat it as highly suspicious if encountered in a software supply chain; restrict to controlled, authorized research environments only.