sage

Fail

Audited by Socket on Mar 1, 2026

2 alerts found:

AnomalyMalware
AnomalyLOW
SKILL.md

The fragment is internally consistent with a purely descriptive skill manifest for organizing AI agent capabilities. There are no active code paths, credentials, or network interactions to evaluate for supply-chain risk. It should be reviewed in the context of how an agent loads and executes these skills to ensure proper access control and least-privilege execution, but the provided content itself does not pose an immediate security threat.

Confidence: 70%Severity: 65%
MalwareHIGH
domains/security/red-team.md

This document is an offensive red-team manual with multiple executable examples for exploitation, C2, credential theft, persistence, and covert exfiltration. The code snippets contain high-risk constructs: dynamic execution of decoded payloads, in-memory shellcode execution, DNS/domain-fronted exfiltration, and explicit persistence/backdoor instructions. It should be treated as malicious/dual-use content; inclusion in a library or automated dependency is a high supply-chain risk and not appropriate for general-purpose packages without strict access controls and clear ethical/legal constraints.

Confidence: 90%Severity: 95%
Audit Metadata
Analyzed At
Mar 1, 2026, 09:11 AM
Package URL
pkg:socket/skills-sh/telagod%2Fcode-abyss%2Fsage%2F@8d70e0242d35bbd14172672296409b595b2d7543