default-cred-sweep

Fail

Audited by Socket on Apr 22, 2026

2 alerts found:

SecurityMalware
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the skill’s purpose is coherent, but that purpose is to help an AI agent conduct default-credential attacks, password spraying, lockout evasion, lateral credential reuse, and post-auth exploitation. There is little direct malware or exfiltration evidence, yet the capability is inherently high-risk offensive security automation with real-world impact.

Confidence: 94%Severity: 92%
MalwareHIGH
evals/evals.json

This fragment contains high-risk, attacker-oriented instruction text for default-credential probing and credential-based exploitation, including explicit guidance to deploy a Tomcat WAR/webshell via Tomcat Manager and then reuse credentials against SSH/MySQL. While there is no executable malware code in the snippet itself, the embedded behaviors are directly conducive to unauthorized access and compromise. Treat as malicious instruction material and avoid deploying it in any context where it could be executed or acted upon by an automated agent.

Confidence: 78%Severity: 86%
Audit Metadata
Analyzed At
Apr 22, 2026, 10:09 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fdefault-cred-sweep%2F@5342bfacae87aaed5192462ae85ff37795eb6800