executing-red-team-exercise

Warn

Audited by Socket on Apr 10, 2026

2 alerts found:

AnomalySecurity
AnomalyLOW
references/api-reference.md

This package is a dual-use red-team planning utility that downloads MITRE ATT&CK STIX data, maps techniques for an emulated actor, and generates operation plans. The code as described does not itself perform exploitation or exfiltration, nor does it exhibit obfuscation. Primary concerns are: (1) supply-chain risk from downloading live JSON without integrity checks, and (2) the potential for misuse because it produces detailed operational plans. Apply integrity verification, add usage controls/auditing, and treat generated outputs as sensitive.

Confidence: 75%Severity: 60%
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the skill’s footprint is intentionally offensive and teaches an AI agent to conduct stealthy adversary operations, including credential theft, evasion, persistence, lateral movement, and exfiltration. The named tools are mostly legitimate red-team products, so this is not confirmed malware, but it is a high-risk offensive capability set that should not be enabled for general-purpose agents.

Confidence: 93%Severity: 96%
Audit Metadata
Analyzed At
Apr 10, 2026, 08:33 AM
Package URL
pkg:socket/skills-sh/mukul975%2FAnthropic-Cybersecurity-Skills%2Fexecuting-red-team-exercise%2F@7cb024b64b5cba2125f3b494d08499ea45925759