cloud-penetration-testing
Fail
Audited by Socket on Feb 27, 2026
1 alert found:
MalwareMalwareSKILL.md
HIGHMalwareHIGH
SKILL.md
The analyzed fragment outlines a full-scope cloud pentesting workflow that mixes legitimate assessment activities with explicit credential harvesting, persistence, and privilege escalation steps. While some commands align with authorized testing, the inclusion of stolen-token reuse, backdoor/service principal creation, and secret exfiltration constitutes high-risk capabilities. Treat as suspicious to high-risk for supply-chain distribution; require strict scoping, approval, auditing, and modularization to remove harmful persistence/credential-exposure steps before any reuse.
Confidence: 95%Severity: 90%
Audit Metadata