http-fingerprinting
Fail
Audited by Socket on Mar 9, 2026
1 alert found:
Obfuscated FileObfuscated FileSKILL.md
HIGHObfuscated FileHIGH
SKILL.md
The http_fingerprinting skill aligns with its stated purpose of detecting technology signatures from HTTP responses. It relies on standard HTTP introspection (headers, cookies, error pages) and uses controlled detection patterns. Risks are mostly informational (fingerprinting exposure) rather than active exploitation. The main concerns are potential command construction pitfalls if input URLs are not validated and the unseen behavior of pre/post hooks. Overall, the footprint is coherent and moderately low-risk for a legitimate developer use case, but a cautious review of the hook scripts and input sanitization is recommended.
Confidence: 98%
Audit Metadata