http-fingerprinting

Fail

Audited by Socket on Mar 9, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

The http_fingerprinting skill aligns with its stated purpose of detecting technology signatures from HTTP responses. It relies on standard HTTP introspection (headers, cookies, error pages) and uses controlled detection patterns. Risks are mostly informational (fingerprinting exposure) rather than active exploitation. The main concerns are potential command construction pitfalls if input URLs are not validated and the unseen behavior of pre/post hooks. Overall, the footprint is coherent and moderately low-risk for a legitimate developer use case, but a cautious review of the hook scripts and input sanitization is recommended.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 9, 2026, 11:36 PM
Package URL
pkg:socket/skills-sh/transilienceai%2Fcommunitytools%2Fhttp-fingerprinting%2F@a06c040e8a1559ed6f226e0bb1cd6663181b2b06