browser-exploitation-v8

Fail

Audited by Socket on Apr 9, 2026

2 alerts found:

SecurityMalware
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the skill’s footprint matches its stated purpose, but that purpose is to arm an AI agent with offensive browser exploitation and sandbox-escape capability. Install sources are mostly official and not the main concern; the core risk is enabling exploit development and attack-chain execution.

Confidence: 95%Severity: 91%
MalwareHIGH
V8_EXPLOITATION_PATTERNS.md

This fragment is strongly exploit-oriented: it provides V8 internals introspection/control, heap/layout manipulation tactics, and exploitation chains that culminate in arbitrary memory read/write and execution redirection/sandbox escape concepts. In a supply-chain context, its presence is a major red flag and should be treated as high-risk/likely malicious scaffolding rather than benign utility code.

Confidence: 86%Severity: 85%
Audit Metadata
Analyzed At
Apr 9, 2026, 01:14 PM
Package URL
pkg:socket/skills-sh/yaklang%2Fhack-skills%2Fbrowser-exploitation-v8%2F@2f80f99325426187783e3dd2385ec3b6d22e60b8