ctf-pwn

Fail

Audited by Socket on Apr 5, 2026

2 alerts found:

SecurityMalware
SecurityMEDIUM
SKILL.md

The skill is internally consistent with its stated purpose, and its installs appear to use legitimate ecosystem sources rather than deceptive third-party endpoints. However, the stated purpose itself is offensive: it equips an AI agent with exploitation, privilege-escalation, and sandbox-escape techniques plus the tools to act on them. This is not confirmed malware or credential theft, but it is a high-risk offensive-security skill and should be classified as suspicious/high risk rather than benign.

Confidence: 92%Severity: 86%
MalwareHIGH
kernel-bypass.md

This fragment is explicit, weaponized Linux kernel exploit guidance and example code: it leaks kernel pointers, defeats KASLR/KPTI/SMEP/SMAP (as described), constructs a kernel ROP chain to run `prepare_kernel_cred/commit_creds`, returns safely to userland, and spawns a root shell via `system("/bin/sh")`. It is high-risk for any non-lab context; covert malware (exfiltration/persistence) is not evidenced in the shown content, but the offensive capability itself makes it dangerous.

Confidence: 84%Severity: 98%
Audit Metadata
Analyzed At
Apr 5, 2026, 02:09 PM
Package URL
pkg:socket/skills-sh/chi111i%2Fctf-skills%2Fctf-pwn%2F@e65f99401bb9a426a9be64fca2bf1eb759a08584