reverse-engineering

Fail

Audited by Socket on Apr 25, 2026

3 alerts found:

Securityx2Malware
SecurityMEDIUM
SKILL.md

The skill is internally consistent with its stated reverse-engineering purpose and shows no direct credential theft or obvious exfiltration path, but it gives an AI agent powerful offensive security capabilities: exploit development, anti-debug bypass, SSL unpinning, hooking, memory dumping, and malware analysis. That makes it high security risk even without clear malicious intent.

Confidence: 89%Severity: 83%
SecurityMEDIUM
tools/dex_memory_dumper.js

This module is a dedicated Android DEX dumping/extraction tool. It reads arbitrary bytes from a target process’s memory and internal class loader structures (via reflection into non-public ART/Dalvik fields), validates candidate DEX headers, and writes recovered .dex blobs to /data/local/tmp for later retrieval. No direct network exfiltration or persistence is evident here, but the capability is intrinsically intrusive and strongly security-relevant, enabling code theft/analysis in scenarios where an attacker has already gained in-device execution.

Confidence: 80%Severity: 85%
MalwareHIGH
references/ios-re.md

This fragment is a high-risk offensive iOS security bypass and reverse-engineering reference. It explicitly demonstrates runtime manipulation of authentication validation, TLS trust evaluation (enabling SSL/TLS validation bypass), and jailbreak-detection checks, and it provides mechanisms/guidance to inspect/dump keychain contents via Security framework interception. Although no hidden network exfiltration is shown in the fragment itself, the capabilities are directly usable for unauthorized compromise and credential/secret harvesting in the context of instrumented targets. Treat it as highly suspicious if encountered in a software supply chain; restrict to controlled, authorized research environments only.

Confidence: 82%Severity: 88%
Audit Metadata
Analyzed At
Apr 25, 2026, 04:32 PM
Package URL
pkg:socket/skills-sh/r00tedbrain-backup%2Fskills%2Freverse-engineering%2F@6bba95e658f41140281efd66845cf71a863fa39e