ctf-crypto
Audited by Socket on Apr 22, 2026
2 alerts found:
AnomalySecurityThis is an educational/attack-writeup document for CTFs and cryptographic research. It contains multiple concrete, actionable exploit patterns for ZK systems, garbled circuits, secret-sharing, threshold signatures, KZG/Groth16 weaknesses, and solver-based recovery. There is no hidden/obfuscated code or direct malware payload in the text itself, but the content is weaponizable: if an adversary has access to the described oracles or leaked artifacts, they could use these techniques to recover keys, forge proofs, replay transactions, or subvert threshold systems. Treat this document as high-risk guidance rather than benign sample code.
SUSPICIOUS: the skill is internally coherent as a CTF cryptography attack guide, but its core function is to equip an AI agent with offensive crypto-exploitation techniques. Install sources are mostly legitimate PyPI packages, so this is not confirmed malware, yet the skill materially increases offensive capability and has moderate supply-chain risk from unpinned packages and third-party tool references.