conducting-social-engineering-pretext-call
Audited by Socket on Apr 10, 2026
2 alerts found:
SecurityMalwareSUSPICIOUS: the skill’s footprint is coherent with its stated red-team purpose, but that purpose is itself a high-risk offensive capability. It operationalizes vishing, impersonation, and credential elicitation against real people, so it should be treated as dangerous security tooling rather than benign documentation.
This artifact is a high-risk operational playbook for conducting vishing-based social engineering campaigns. It contains actionable, role-tailored pretexts (including CEO/wire-transfer fraud), normalization of caller ID spoofing, and measurement-driven optimization of deception. The document enables financial fraud, unauthorized access, and privacy violations. If found in code or project repositories, treat as malicious or highly suspicious content: remove, audit repository history, identify authors, and verify legitimate authorized testing scope before any use.