cryptography

Fail

Audited by Socket on May 11, 2026

4 alerts found:

Securityx3Malware
SecurityMEDIUM
reference/scenarios/signature-forgery/jwt-alg-confusion.md

This fragment is explicitly an offensive JWT forgery/exploitation playbook focused on authentication bypass via algorithm confusion. It does not itself evidence embedded malware, backdoors, or data exfiltration, but it meaningfully increases the risk profile of a supply chain artifact if included in a package distributed to consumers. Treat as high sensitivity content and verify whether it is only documentation or also reachable/used by runtime code elsewhere in the package.

Confidence: 74%Severity: 78%
SecurityMEDIUM
reference/scenarios/padding-oracle/pkcs1-v1.5-bleichenbacher.md

This module is not a deployable payload; it is actionable exploit documentation for the Bleichenbacher PKCS#1 v1.5 padding oracle and ROBOT-style side channels. If included in a dependency or distributed as part of a package, it meaningfully increases attacker capability to perform adaptive chosen-ciphertext decryption against vulnerable RSA/TLS endpoints. Malware likelihood is low because no executable behavior is present, but security risk is high due to the offensively detailed, step-by-step exploitation content.

Confidence: 74%Severity: 78%
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the skill is internally coherent, but its purpose is to equip an AI agent with offensive cryptanalysis techniques against targets. There is little evidence of malware, credential theft, or supply-chain abuse in the excerpt, yet the offensive-security capability itself makes the skill high-risk.

Confidence: 87%Severity: 74%
MalwareHIGH
reference/scenarios/signature-forgery/rsa-pkcs1-v1.5-bleichenbacher.md

This fragment is highly actionable exploit guidance for creating forged RSA-PKCS#1 v1.5 signatures by targeting non-strict verification behavior and small public exponent conditions (primarily e=3). While it does not itself perform network/file actions, it materially enables authentication/handshake bypass in vulnerable verifiers and should be treated as high-risk offensive content in any software supply-chain context. Recommend removing/isolating any such content from production packages unless explicitly justified for controlled security research with appropriate safeguards.

Confidence: 74%Severity: 92%
Audit Metadata
Analyzed At
May 11, 2026, 07:49 AM
Package URL
pkg:socket/skills-sh/transilienceai%2Fcommunitytools%2Fcryptography%2F@9b22d658f1745f6dfd3fe3549dd90375ce46e763