File Path Traversal Testing
Audited by Socket on Feb 17, 2026
1 alert found:
Security[Skill Scanner] Credential file access detected All findings: [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] This file is a high-quality, technically accurate offensive testing playbook for path traversal and LFI exploitation. It contains practical, actionable payloads and escalation paths (including RCE techniques) that are powerful in the hands of a tester or attacker. The artifact itself is not executable malware and contains no obfuscated/hidden code or external exfiltration endpoints, but it is high-risk due to its detailed offensive guidance and potential for misuse. Recommend treating it as dual-use: acceptable for authorized security assessments, but restrict distribution and use in environments without explicit permission. LLM verification: The skill is a high-fidelity, dual-use pentesting guide for path traversal/LFI. Its capabilities and payloads align with its stated purpose (BENIGN in intent for authorized testing) but the content is sensitive and can be readily abused if used without permission. There are no hidden network exfiltration endpoints or obfuscated payloads, and no direct credential harvesting code — however the omission of explicit legal/ethical guidance and the inclusion of highly sensitive targets increases misus