android-pentesting-tricks

Fail

Audited by Socket on Apr 9, 2026

2 alerts found:

SecurityMalware
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the skill is internally consistent as an Android pentesting playbook, but it gives an AI agent explicit offensive security capabilities, sensitive-data extraction procedures, and transitive loading of related attack skills. The main risk is not hidden malware but enabling high-impact exploitation and data access through the agent.

Confidence: 94%Severity: 91%
MalwareHIGH
FRIDA_SCRIPTS.md

High-risk dual-use offensive Frida instrumentation. It implements multiple explicit bypasses (SSL pinning, root detection, biometric auth) and direct extraction/exfiltration of sensitive data (cryptographic keys/plaintext/ciphertext, full SharedPreferences, intent extras, WebView-loaded content and JS execution). While framed as 'Android testing', the capabilities strongly match patterns of unauthorized interception and credential theft; the code should not be used outside controlled security testing and should be treated as malicious-ready tooling.

Confidence: 90%Severity: 90%
Audit Metadata
Analyzed At
Apr 9, 2026, 01:14 PM
Package URL
pkg:socket/skills-sh/yaklang%2Fhack-skills%2Fandroid-pentesting-tricks%2F@daba487ea38364c86357d5e7118b565406b5c490