blockchain-security
Audited by Socket on Apr 20, 2026
2 alerts found:
AnomalySecurityNo direct supply-chain malware behavior (exfiltration, persistence, credential theft, or network beacons) is evidenced in the provided fragment because it reads as an educational attack description rather than runtime library code. However, it describes a severely dangerous contract vulnerability pattern: attacker-controlled `delegatecall` with storage-layout mirroring, enabling unauthorized state changes in the victim contract’s storage. If similar logic exists in a real dependency/module, it would be a significant security alert requiring immediate review and mitigation (restrict delegatecall targets, enforce allowlists, and avoid arbitrary delegatecall).
SUSPICIOUS: the skill is internally consistent for blockchain CTF exploitation, but its actual footprint is inherently high risk because it equips an AI agent to perform offensive smart-contract attacks and autonomous on-chain actions using private keys. Install trust is comparatively acceptable, but the offensive capability and transaction signing make this unsuitable as a low-risk general skill.