sandbox-evasion-implement

Fail

Audited by Socket on Apr 22, 2026

3 alerts found:

Malwarex3
MalwareHIGH
references/timing-interaction.md

This code fragment is a high-risk anti-sandbox/anti-debugging evasion and conditional activation framework. It aggregates timing, user interaction, and host fingerprint signals to detect analysis environments, delays execution to evade sandbox timeouts, applies a hardcoded domain guardrail to restrict activation to a target environment, and then proceeds to a staged decrypt-and-execute payload. Even without the payload body, the surrounding structure is strongly consistent with malware loader/dropper behavior intended for supply-chain delivery and defense evasion.

Confidence: 90%Severity: 95%
MalwareHIGH
SKILL.md

MALICIOUS. The skill’s purpose and instructions are fundamentally offensive: it equips an AI agent to implement anti-sandbox, anti-analysis, stealth, and payload-execution logic for malware operations. There is little supply-chain evidence in the text, but the core capability is itself incompatible with benign agent use and materially increases operational attack risk.

Confidence: 97%Severity: 99%
MalwareHIGH
references/anti-vm-snippets.md

This code fragment is dominated by anti-virtualization and anti-debugging techniques (PEB/NtQueryInformationProcess checks, hardware breakpoint detection, timing-based VM heuristics, and exception probing) and uses their results to gate execution into either a decoy UI/termination or a subsequent decrypt-and-execute payload routine. Even though the actual payload implementation is not present in the snippet, the overall staging and evasion pattern is strongly consistent with malicious loader behavior and poses a high security risk if included in a dependency.

Confidence: 78%Severity: 85%
Audit Metadata
Analyzed At
Apr 22, 2026, 08:01 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fsandbox-evasion-implement%2F@e0cfb72fc87e4406fff01b640650c29e463340d3