evasion-research

Fail

Audited by Socket on Apr 22, 2026

2 alerts found:

SecurityMalware
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the skill is internally consistent, but its purpose is to equip an AI agent to research and operationalize detection-evasion and loader/C2 techniques. There is no strong evidence of credential theft or malicious exfiltration, yet the offensive-security focus plus ingestion of untrusted GitHub content makes it a high-risk skill.

Confidence: 91%Severity: 82%
MalwareHIGH
evals/evals.json

This fragment is not malware code by itself, but it is a high-risk “evasion research” instruction/config that explicitly directs GitHub searching and the curation/storage (“入库”) of Windows malware-evasion techniques (shellcode loaders, direct syscalls like NtCreateThreadEx, and AMSI bypass including AmsiScanBuffer patching and AES-encrypted bypass). If used in a supply-chain or automation pipeline, it materially increases the likelihood of acquiring and operationalizing offensive tradecraft.

Confidence: 83%Severity: 90%
Audit Metadata
Analyzed At
Apr 22, 2026, 10:09 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fevasion-research%2F@e152371e46c1282daf746fdb7961cdb5546b6c18