SMTP Penetration Testing

Fail

Audited by Socket on Feb 17, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Installation of third-party script detected All findings: [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] [CRITICAL] command_injection: Installation of third-party script detected (SC006) [AITech 9.1.4] This skill is a legitimate, dual-use penetration testing guide for SMTP servers. It aligns well with its stated purpose, uses standard tools and direct interactions with the target, and does not include obfuscated code or hidden exfiltration endpoints. The primary risk is abuse: the document prescribes active techniques (user enumeration, brute force, open-relay exploitation, sending test emails) that can be harmful if performed without explicit authorization. Use only with written permission and appropriate safeguards and logging. LLM verification: This document is a complete, practical SMTP penetration-testing playbook that correctly maps procedures to tools and SMTP protocol features. There is no evidence in the provided text of embedded malware, obfuscation, or covert exfiltration. The main concern is dual-use: the instructions enable intrusive testing (enumeration, brute force, open-relay exploitation) that may be illegal or harmful if used without explicit authorization. Operators should only use these procedures with written permissi

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 17, 2026, 08:34 AM
Package URL
pkg:socket/skills-sh/zebbern%2Fclaude-code-guide%2Fsmtp-penetration-testing%2F@45067d430fc57a0577a76ab71b152bd90b55b414