ctf-ai-ml

Warn

Audited by Socket on Apr 22, 2026

2 alerts found:

AnomalySecurity
AnomalyLOW
references/llm-attacks.md

This code is clearly offensive CTF material: it constructs and sends many LLM-attack payloads (prompt injection, jailbreaks, token-smuggling via zero-width chars, context exhaustion, and tool-use exploitation attempts) to a chat API endpoint and prints responses while searching for flags. It does not directly execute system commands or read local secrets itself, but it strongly aims to coerce a remote LLM/agent into privileged actions. As a supply-chain dependency, it would be highly suspicious if used outside a controlled CTF setting; however, within the fragment shown it is not implementing malware locally—its threat is inducing harmful behavior on the target service.

Confidence: 80%Severity: 55%
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the skill is internally consistent for a CTF offensive-AI purpose and does not show credential theft or third-party exfiltration, but it is a high-risk offensive security skill for AI agents. Main risks are exploit enablement against AI systems, unsafe loading of untrusted model files, and ordinary unpinned package-install supply-chain exposure.

Confidence: 91%Severity: 84%
Audit Metadata
Analyzed At
Apr 22, 2026, 07:59 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fctf-ai-ml%2F@758e48efad72f9486c4f48586deb4f2c23b59a8b