ethical-hacking-methodology
Audited by Socket on Feb 28, 2026
1 alert found:
MalwareThis skill is a comprehensive, step-by-step offensive security guide covering reconnaissance, scanning, exploitation, persistence, and reporting. It contains explicit, runnable commands and configurations that enable remote compromise, credential harvesting, persistence, privilege escalation, and cover-up techniques. Framed as an 'ethical' skill requiring authorization, it is legitimate for trained, authorized security professionals; however, the level of operational detail means it is high-risk if used by untrained individuals or provided to an AI agent with execution capabilities. The content itself is not obfuscated and does not include hidden backdoors or embedded malicious code, but it materially lowers the barrier to misuse and could enable malicious activity. Recommend restricting automated execution of this skill, enforcing human-in-the-loop approval, and auditing usage and distribution.