kernel-exploitation

Warn

Audited by Socket on Apr 9, 2026

3 alerts found:

Securityx3
SecurityMEDIUM
KERNEL_MITIGATION_BYPASS.md

The provided fragment is not a software library implementation; it is an explicit kernel exploitation/mitigation-bypass instruction playbook containing actionable, privilege-escalation-oriented guidance (including KASLR derivation, CR4/SMEP/SMAP bypass concepts, KPTI trampoline return-to-user logic, FG-KASLR derandomization strategies, and CFI bypass discussions). No runtime malicious behavior (network/file/process execution) is present in this snippet itself, but its operational nature makes it a serious security concern if included in a dependency artifact.

Confidence: 68%Severity: 78%
SecurityMEDIUM
KERNEL_HEAP_TECHNIQUES.md

This fragment is not executable malware; it is highly actionable kernel exploitation documentation. While no backdoor, credential theft, or network exfiltration behavior is present in the provided content, its detailed guidance for arbitrary kernel read/control-flow (msg_msg, pipe_buffer/ops->release, DirtyPipe-style concepts) makes it a significant security risk due to facilitating real-world exploitation if shipped within a dependency.

Confidence: 74%Severity: 78%
SecurityMEDIUM
SKILL.md

SUSPICIOUS: The skill is internally coherent and uses mostly legitimate tooling, but its core function is to equip an AI agent with offensive kernel exploitation and privilege-escalation procedures. That makes it high security risk by capability, though not confirmed malware or credential theft.

Confidence: 95%Severity: 92%
Audit Metadata
Analyzed At
Apr 9, 2026, 01:14 PM
Package URL
pkg:socket/skills-sh/yaklang%2Fhack-skills%2Fkernel-exploitation%2F@72e2107a26fd8408c99aa00a69bae3d83e800919