authenticating
Audited by Socket on Mar 21, 2026
3 alerts found:
AnomalySecurityx2This document is an explicit offensive testing guide intended for authorized pentesting of 2FA/OTP systems. It contains many actionable techniques (response manipulation, direct endpoint skipping, OTP parameter tampering, brute-force, OTP extraction via IMAP/disposable-mail APIs, predictable TOTP generation) that, while useful for defenders and testers, are dual-use and can be misused for unauthorized account compromise or abuse. I did not find obfuscated or hidden malicious code in the fragment; the risks come from the instructions themselves and the inclusion of illustrative hardcoded credentials and plaintext credential-handling examples. Recommendations: ensure this material is used only in authorized engagements, avoid embedding real credentials in tests, and add clear legal/authorization disclaimers. From a supply-chain perspective, this text is not malware but represents high operational risk if executed against targets without permission.
This code is a comprehensive evasion toolkit for browser-based bot detection. It contains multiple techniques to falsify fingerprints, hide automation indicators, and simulate human behavior. The code itself does not contain obfuscated payloads, hardcoded credentials, or explicit exfiltration to attacker-controlled servers, but its purpose is to enable evasion of defensive controls and therefore it is high-risk if used without authorization. Use only in authorized testing; treat as potentially malicious if found in dependencies without explicit, permitted intent.
SUSPICIOUS. The skill’s capabilities match its stated purpose, but that purpose is itself a high-risk offensive security function for an AI agent: 2FA bypass, CAPTCHA solving, stealth/bot evasion, OTP extraction, and automated account actions. Dependency provenance is mostly legitimate, so this is not confirmed malware, but the operational footprint is dangerous and disproportionate for routine agent use.