web-reverse

Warn

Audited by Socket on Mar 21, 2026

2 alerts found:

Securityx2
SecurityMEDIUM
references/replay.md

This script is a legitimate-looking API replay/reconstruction tool that builds HMAC signatures and sends authenticated requests using captured credentials. It does not contain obfuscated or self-propagating malware, but it does include hardcoded sensitive data (APP_KEY, SECRET, TOKEN) and performs network requests — making it potentially dangerous in a supply-chain context if real secrets are present. Treat any published package containing similar code and real credentials as high risk and remove secrets from source. Recommend rotating any keys/tokens present in code and performing a package audit before use.

Confidence: 85%Severity: 70%
SecurityMEDIUM
SKILL.md

SUSPICIOUS/HIGH-RISK skill. Its capabilities are internally consistent with its stated purpose, but that purpose is itself an offensive reverse-engineering toolkit for an AI agent: tracing cookies/tokens, bypassing anti-debugging, reconstructing signing logic, and replaying protected requests. Tool provenance is mostly official, so this is not confirmed malware, but it materially increases the agent’s ability to perform security-sensitive and potentially unauthorized actions against web targets.

Confidence: 88%Severity: 83%
Audit Metadata
Analyzed At
Mar 21, 2026, 01:13 AM
Package URL
pkg:socket/skills-sh/zhongjiaxiong%2Fweb-reverse-skill-notes-20260319%2Fweb-reverse%2F@813b2a8a84dfc76e3ebdd6578c3bc7e2096c518e