macos-security-bypass

Fail

Audited by Socket on Apr 9, 2026

2 alerts found:

SecurityMalware
SecurityMEDIUM
SKILL.md

High-risk offensive security skill. Its actual footprint is coherent with a red-team bypass playbook, but that footprint is inherently dangerous for an AI agent because it teaches endpoint protection bypass, privilege abuse, persistence, and transitive loading of other offensive skills.

Confidence: 97%Severity: 95%
MalwareHIGH
TCC_BYPASS_MATRIX.md

This fragment is highly suspicious and strongly indicative of malicious intent: it is an offensive playbook for bypassing macOS TCC privacy controls and abusing PPPC/MDM to pre-approve sensitive permissions, includes a PPPC XML permission-grant template, and provides concrete local reconnaissance commands targeting TCC.db and entitlements. If present in a supply-chain dependency, it should be treated as a security-critical risk and excluded/reviewed with priority.

Confidence: 90%Severity: 95%
Audit Metadata
Analyzed At
Apr 9, 2026, 01:14 PM
Package URL
pkg:socket/skills-sh/yaklang%2Fhack-skills%2Fmacos-security-bypass%2F@62e7042446f221816456021c7f9c3e619668da93