system
Audited by Socket on May 2, 2026
2 alerts found:
Securityx2This “source code” appears to be an exploit-development tutorial rather than a legitimate dependency implementation. It provides detailed, actionable instructions for heap info leaks, tcache poisoning, arbitrary write, and control-flow hijacking on modern glibc, including explicit guidance to spawn a shell. While there is no evidence here of a deployed malware payload (since no executable package logic is shown), distributing such content through a dependency would represent a serious security risk by materially enabling exploitation.
SUSPICIOUS: the skill’s purpose and capabilities align, but that purpose is to enable offensive exploitation by an AI agent. The main risk is not hidden exfiltration or supply chain behavior in this snippet; it is the explicit high-risk security/exploit functionality and implied autonomous attack workflow.