default-cred-sweep
Audited by Socket on Apr 22, 2026
2 alerts found:
SecurityMalwareSUSPICIOUS: the skill’s purpose is coherent, but that purpose is to help an AI agent conduct default-credential attacks, password spraying, lockout evasion, lateral credential reuse, and post-auth exploitation. There is little direct malware or exfiltration evidence, yet the capability is inherently high-risk offensive security automation with real-world impact.
This fragment contains high-risk, attacker-oriented instruction text for default-credential probing and credential-based exploitation, including explicit guidance to deploy a Tomcat WAR/webshell via Tomcat Manager and then reuse credentials against SSH/MySQL. While there is no executable malware code in the snippet itself, the embedded behaviors are directly conducive to unauthorized access and compromise. Treat as malicious instruction material and avoid deploying it in any context where it could be executed or acted upon by an automated agent.