infrastructure

Fail

Audited by Socket on May 2, 2026

7 alerts found:

AnomalySecurityx2Malwarex4
AnomalyLOW
reference/service-enum.md

No executable malware is present in the snippet itself (it is documentation/command templates), so direct local compromise indicators are absent. However, the content is highly actionable and includes explicit exploitation guidance for achieving RCE/webshell deployment across common services. If distributed within a software supply chain or used by automation, it represents a significant dual-use security risk and should be treated as suspicious content requiring review/controls.

Confidence: 66%Severity: 68%
SecurityMEDIUM
SKILL.md

This skill is internally consistent as an offensive network pentesting skill, but that purpose itself is high risk for an AI agent. It enables active attacks, credential capture, disruption, and ICS/SCADA manipulation without clear safety controls, so it should be classified as suspicious/high-risk rather than benign.

Confidence: 94%Severity: 93%
SecurityMEDIUM
reference/ics-modbus-quickstart.md

This fragment is high-risk in an ICS context because it provides actionable exploitation guidance and a generic pymodbus custom function-code crafting template that can transmit arbitrary proprietary payloads to a Modbus target. While it does not show classic malware behaviors (exfiltration, persistence, or stealth), it enables unauthorized reconnaissance and potentially unauthorized control (write/override workflows) consistent with ICS attack patterns. Confidence is limited because only an excerpt is available and it is not clear whether full read/write/session-hijack logic is implemented elsewhere in the package.

Confidence: 62%Severity: 70%
MalwareHIGH
reference/dos-quickstart.md

This document is an operational DoS testing playbook that includes explicit, executable commands enabling high-impact denial-of-service and amplification attacks. It lacks sufficient legal/ethical controls and safeguards, creating a high risk of misuse and collateral harm if published publicly. Treat as high-security-risk content: restrict access, add mandatory authorization/coordination controls, or remove from public distribution. It is enabling malicious activity (high probability of misuse) though it is not executable malware per se.

Confidence: 75%Severity: 95%
MalwareHIGH
reference/wifi-wpa-enterprise-quickstart.md

This artifact is an explicitly actionable WiFi/WPA-Enterprise credential theft and unauthorized access playbook. It describes coercive client disruption (deauth), rogue AP/EAP MITM tactics (including cert-handling and captive portal phishing), interception of MSCHAPv2-related material, extraction and offline cracking of hashes, and re-authentication with recovered credentials. If distributed within a software supply chain, it would be highly suspicious and unsafe because it directly enables wrongdoing rather than implementing a defensive or legitimate feature.

Confidence: 90%Severity: 100%
MalwareHIGH
reference/ipv6-quickstart.md

The file is an offensive IPv6 attack cheat-sheet containing explicit techniques, tools, and commands to discover and exploit IPv6 hosts and transition mechanisms (RA spoofing, NDP poisoning, tunnel abuse, extension header manipulation). It is actionable and high-risk: executing the listed commands against networks without explicit authorization will produce malicious effects (MitM, traffic redirection, DoS, evasion). Treat as harmful operational guidance and avoid running these commands except in authorized test environments with appropriate controls.

Confidence: 80%Severity: 90%
MalwareHIGH
reference/smb-netbios-quickstart.md

The provided fragment is a highly actionable offensive SMB/NetBIOS attack playbook. It explicitly instructs on enumeration, authentication bypass attempts (null/empty/guest), forced authentication to an attacker-controlled UNC endpoint for NTLMv2 credential harvesting (SCF/UNC trigger technique), NTLM relay for credential abuse, post-auth share reconnaissance for secrets, and includes guidance to test known SMB exploitation (EternalBlue). If such content were present in a software dependency and could be invoked, it would represent an extreme security risk with clear malicious intent (credential theft/abuse).

Confidence: 84%Severity: 100%
Audit Metadata
Analyzed At
May 2, 2026, 01:10 AM
Package URL
pkg:socket/skills-sh/transilienceai%2Fcommunitytools%2Finfrastructure%2F@c75ff3168e6169c3ed580035f7e1e7d072179a27