threat-hunting-evasion

Fail

Audited by Socket on Apr 22, 2026

2 alerts found:

SecurityMalware
SecurityMEDIUM
SKILL.md

SUSPICIOUS: the skill is internally coherent as an offensive evasion guide, but its purpose is to help operators avoid threat hunting and detection rather than perform benign developer tasks. It has low supply-chain and exfiltration risk in the provided text, but high security risk because it gives an AI agent offensive security/evasion capability.

Confidence: 94%Severity: 88%
MalwareHIGH
references/detection-rules-bypass.md

This artifact is not benign dependency code; it is an attack-focused detection-evasion and operational tradecraft write-up. It contains a functional Python YARA rule scanner (reads local rules/payload paths and prints match details) intended for adversarial payload validation, plus illustrative loader and offensive technique examples (including an in-memory assembly download/reflective execution pattern). Even though the snippet does not prove actual malware execution on its own, its strong malicious intent and inclusion of execution-oriented patterns make it a high-risk supply-chain security concern.

Confidence: 66%Severity: 88%
Audit Metadata
Analyzed At
Apr 22, 2026, 10:11 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fthreat-hunting-evasion%2F@308ce7198564254a8daf015aa901a6f84fc6dec3