bug-bounty

Fail

Audited by Socket on May 6, 2026

6 alerts found:

Anomalyx3Malwarex3
AnomalyLOW
agents/recon-agent.md

This fragment is a recon/vulnerability-scanning orchestration script: it enumerates subdomains, detects live hosts, crawls URLs, heuristically classifies endpoints, and runs nuclei templates to produce an attack-surface report. There are no clear indicators of embedded malware, backdoors, exfiltration to unrelated domains, or obfuscated behavior. The primary security concerns are (1) unquoted shell variable expansion that could lead to command/argument injection if the target input is not strictly validated, and (2) operational handling of the Chaos API authorization token plus privacy/egress exposure from contacting external enumeration and archival services. Overall: security-relevant tooling with moderate risk due to implementation hardening gaps, not clear malicious payloads.

Confidence: 72%Severity: 52%
AnomalyLOW
skills/triage-validation/SKILL.md

SUSPICIOUS: the skill is internally coherent and does not show malicious install, credential theft, or third-party data routing, but it equips an AI agent with offensive security validation workflows for real targets. That makes it materially risky even though it is not malware.

Confidence: 86%Severity: 69%
AnomalyLOW
tools/h1_mutation_idor.py

The code functions as a targeted IDOR testing harness against HackerOne's GraphQL API, capable of performing numerous privileged mutations using provided account cookies. While not inherently malicious, its capability to alter or disclose information makes it risky if misused or deployed without explicit authorization. The insecure SSL handling and brittle CSRF token extraction further elevate operational risk. A safer, auditable version would constrain mutations, validate inputs, and remove disablement of TLS verification. Overall risk is elevated due to potential destructive actions on real reports.

Confidence: 59%Severity: 60%
MalwareHIGH
tools/vuln_scanner.sh

This Bash script is an active web exploitation tool that generates and verifies high-impact attack PoCs (uploading executable webshell payloads for RCE, time-based SQLi exploitation confirmation, SSTI/XSS testing, MFA bypass/probing, and SAML signature-stripping ATO probing). It also writes Metasploit RC scripts for admin-shell upload with default credentials. If this code is shipped as part of a dependency, it represents an extremely high supply-chain security risk due to intentional sabotage/exploitation behavior rather than benign scanning.

Confidence: 90%Severity: 95%
MalwareHIGH
tools/hai_payload_builder.py

Overall, this module is best characterized as a weaponized payload/jailbreak generator. It implements an intentional covert channel (invisible Unicode bit-encoding) to embed “hidden” prompt-injection instructions into seemingly normal text, and it bundles extensive offensive VAPT exploit/probe strings for distribution. While this specific module does not itself execute exploits or perform network exfiltration, it is designed to enable downstream misuse against LLMs and applications. Treat as high security risk due to covert instruction embedding and malicious template content; verify snippet integrity before any use.

Confidence: 82%Severity: 80%
MalwareHIGH
agents/chain-builder.md

This artifact is an exploit-chain automation/workflow specification that meaningfully facilitates multi-hop offensive attacks. It explicitly targets credential/token theft and privilege escalation (OAuth ATO via redirect/subdomain takeover, SSRF to cloud metadata for IAM credentials, stored XSS to admin privilege escalation) and instructs active verification using crafted requests and OOB callbacks. If distributed as a package/dependency, it should be treated as high-risk and likely misuse-oriented rather than benign security tooling.

Confidence: 86%Severity: 90%
Audit Metadata
Analyzed At
May 6, 2026, 11:38 AM
Package URL
pkg:socket/skills-sh/shuvonsec%2Fclaude-bug-bounty%2Fbug-bounty%2F@5413144a0a5360dea314f54d21a75d9a1158db15