OSCP Notes

Warn

Audited by Socket on Feb 16, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

[Skill Scanner] Credential file access detected All findings: [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] The document is a comprehensive, actionable OSCP/penetration-testing cheat-sheet that contains explicit, copy-paste commands to discover, exploit, and persist on target systems (uploading web shells, Redis SSH key injection, SMB log poisoning, credential dumping). There is no evidence inside this fragment of obfuscation, hidden exfiltration endpoints, or embedded malware; instead the primary concern is high operational risk from dual-use exploitation techniques. Use is appropriate only in authorized testing contexts; as-distributed it lacks safeguards or legal/ethical disclaimers. Recommendation: treat as high-risk dual-use content — acceptable for controlled, authorized labs but dangerous if applied against systems without explicit permission. LLM verification: The SKILL.md content is a detailed offensive pentesting guide that provides explicit, actionable commands to enumerate, exploit, persist on, and gain shells on remote hosts. There is no programmatic exfiltration or obfuscation in the document itself, but it instructs a human (or an agent with shell/network privileges) how to perform unauthorized actions (upload shells, inject SSH keys via Redis, obtain reverse shells). As a skill, its capabilities are disproportionate for benign uses and pose a

Confidence: 75%Severity: 75%
Audit Metadata
Analyzed At
Feb 16, 2026, 01:35 PM
Package URL
pkg:socket/skills-sh/zebbern%2Fsecops-cli-guides%2Foscp-notes%2F@8089623a117fa97bc60ce038739ebbd571e7eb92