conducting-social-engineering-pretext-call

Fail

Audited by Socket on Apr 10, 2026

2 alerts found:

SecurityMalware
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the skill’s footprint is coherent with its stated red-team purpose, but that purpose is itself a high-risk offensive capability. It operationalizes vishing, impersonation, and credential elicitation against real people, so it should be treated as dangerous security tooling rather than benign documentation.

Confidence: 92%Severity: 84%
MalwareHIGH
references/workflows.md

This artifact is a high-risk operational playbook for conducting vishing-based social engineering campaigns. It contains actionable, role-tailored pretexts (including CEO/wire-transfer fraud), normalization of caller ID spoofing, and measurement-driven optimization of deception. The document enables financial fraud, unauthorized access, and privacy violations. If found in code or project repositories, treat as malicious or highly suspicious content: remove, audit repository history, identify authors, and verify legitimate authorized testing scope before any use.

Confidence: 75%Severity: 95%
Audit Metadata
Analyzed At
Apr 10, 2026, 06:27 PM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fconducting-social-engineering-pretext-call%2F@37053d218db048e3d16b7b2b85dc9119d15be5c6