android-app-pentesting

Fail

Audited by Socket on May 5, 2026

2 alerts found:

SecurityMalware
SecurityMEDIUM
SKILL.md

该技能不像凭据窃取型恶意技能,目的与能力基本一致,且多数安装源可验证;但它明确赋予 AI Agent 高风险移动端渗透测试与绕过能力,包含数据提取、MITM、Hook 与防护绕过,对真实目标可产生直接安全影响。因此应归类为高风险、非恶意但敏感的 offensive-security 技能。

Confidence: 89%Severity: 84%
MalwareHIGH
references/android-frida-dynamic.md

High-risk offensive capability. The included Frida hook(s) explicitly bypass Android TLS/certificate pinning by overriding certificate and trust verification logic, and the workflows add traffic interception (apk-mitm/iptables redirect) plus in-memory DEX extraction to external storage. Combined with intrusive Drozer test/exploitation-like payload examples, this content is strongly indicative of malicious or adversarial tooling and should not be used as a supply-chain dependency artifact without strict isolation and provenance controls.

Confidence: 86%Severity: 95%
Audit Metadata
Analyzed At
May 5, 2026, 05:07 PM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fandroid-app-pentesting%2F@0cd0ea80363dad5ef0ac891c33c1ebf20ab23a91