dfir

Fail

Audited by Socket on May 11, 2026

3 alerts found:

AnomalyMalwarex2
AnomalyLOW
SKILL.md

SUSPICIOUS due to high-risk security/forensics capability being granted to an AI agent, but not malicious. The skill is internally consistent with a DFIR purpose, uses proportionate package-manager installs, and shows no credential harvesting or exfiltration. Main risk comes from enabling offensive-adjacent analysis workflows and handling untrusted forensic content with executable tooling.

Confidence: 91%Severity: 63%
MalwareHIGH
reference/scenarios/pcap/credential-extraction.md

This fragment is an attack-enabling credential harvesting and cracking/session-replay workflow. It reads authentication material from a PCAP, extracts and decodes plaintext credentials, assembles challenge-response hashes into cracking-ready formats, and includes guidance to replay session cookies. It is highly likely to be misused outside authorized testing/incident response and would materially increase compromise capability.

Confidence: 86%Severity: 100%
MalwareHIGH
reference/scenarios/memory/memory-credential-extraction.md

This fragment is highly suspicious supply-chain content: it is an actionable credential theft/LSASS dumping and decryption workflow focused on recovering passwords/hashes/Kerberos tickets/DPAPI master keys. Even without executable logic shown, disseminating this kind of operational TTP guidance in a package significantly increases misuse potential and should be treated as a serious security concern pending verification of the repository’s legitimate purpose and how/why it’s distributed.

Confidence: 72%Severity: 90%
Audit Metadata
Analyzed At
May 11, 2026, 07:50 AM
Package URL
pkg:socket/skills-sh/transilienceai%2Fcommunitytools%2Fdfir%2F@3419113a28120351510a29ecac55852e3b5ffe2b