command-injection-methodology
Audited by Socket on May 9, 2026
3 alerts found:
Malwarex3MALICIOUS. This skill’s stated purpose is offensive exploitation: it teaches an AI agent to discover and exploit command injection, steal files, bypass filters, exfiltrate data, and maintain shell access. The capability is coherent with its purpose, but that purpose is itself a high-risk exploit tool for AI agents and not a benign developer workflow.
This fragment is highly suspicious and effectively an attacker playbook for command injection exploitation and secret exfiltration. If such content appears in a software dependency, it strongly suggests malicious intent or facilitation of compromise (e.g., by providing ready-to-use payloads to weaponize a command injection vulnerability). There is no evidence of benign functionality in the provided content.
This fragment is not a benign dependency module; it is adversarial, instruction-bearing content that directly enables command-injection exploitation and secret/flag extraction, including filter bypass, blind/time-based extraction, and RCE-style chaining guidance. While it contains no executable code here, its intended use is highly weaponizable and should be treated as a major supply-chain security red flag if shipped with a package.