client-side

Fail

Audited by Socket on Apr 20, 2026

6 alerts found:

AnomalySecurityx4Malware
AnomalyLOW
reference/prototype-pollution-cheat-sheet.md

This fragment is not normal dependency implementation code; it is a highly weaponized prototype-pollution exploitation cheat sheet containing actionable payloads for XSS, auth/feature-flag bypass, server-side RCE/process spawning, reverse shell patterns, and data exfiltration. While it does not itself prove a backdoor or active malware execution, its inclusion in a distributed package/artifact would be a significant supply-chain red flag and should trigger deeper review of the actual dependency package files (entrypoints, postinstall scripts, and runtime behavior).

Confidence: 78%Severity: 68%
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the skill is coherent with its stated purpose, but that purpose is to equip an AI agent with offensive web-security testing capabilities. There is no evidence of credential theft, covert exfiltration, or malicious installer behavior in the provided text, but the exploit-oriented scope makes it high security risk as an agent skill.

Confidence: 91%Severity: 79%
SecurityMEDIUM
reference/clickjacking-cheat-sheet.md

This fragment is an offensive, weaponized clickjacking/XSS cheat sheet with explicit exploit templates, frame-bypass considerations, and payload examples that demonstrate attacker-controlled data exfiltration and external hook/script loading. While it is not a typical software dependency implementation with runtime persistence, packaging or distributing this content presents a severe supply-chain misuse risk and strongly aligns with malicious intent.

Confidence: 86%Severity: 90%
SecurityMEDIUM
reference/prototype-pollution-quickstart.md

This fragment is offensive, dual-use documentation that provides step-by-step workflows and ready-to-use prototype pollution payloads aimed at client-side XSS and server-side privilege escalation/RCE-like behavior, including out-of-band verification guidance. It does not show executable malware or persistence within the fragment itself, but it meaningfully facilitates exploitation and should be treated as high-risk content if present in distributed packages or developer tooling.

Confidence: 78%Severity: 76%
SecurityMEDIUM
reference/cors-quickstart.md

This fragment is high-risk offensive material: an exploitation and payload reference for credentialed CORS misconfiguration that instructs how to harvest authenticated API responses and exfiltrate them to attacker infrastructure. There is no evidence of self-executing malware/backdoor behavior in the snippet itself, but distributing this as part of a software dependency significantly elevates misuse risk.

Confidence: 76%Severity: 87%
MalwareHIGH
reference/xss-exploitation-techniques.md

This fragment is explicitly malicious/adversarial content: it provides actionable XSS exploitation payloads and workflows for cookie/session theft, password/clipboard/keylogging capture, CSRF-to-account-takeover chaining via token extraction, internal network scanning, data exfiltration, UI phishing/defacement, and remote hook loading. If present within a software supply chain dependency, it represents an extremely high security risk and strong malware/abuse intent indicator. Obfuscation is not apparent; the danger is the direct offensive payload nature.

Confidence: 90%Severity: 100%
Audit Metadata
Analyzed At
Apr 20, 2026, 11:14 PM
Package URL
pkg:socket/skills-sh/transilienceai%2Fcommunitytools%2Fclient-side%2F@e52de8bd6ca7c850d6df309deb3ba6027f1f1044