workers-app-tester

Fail

Audited by Socket on Apr 10, 2026

3 alerts found:

Securityx2Malware
SecurityMEDIUM
SKILL.md

High-risk but internally coherent offensive security skill. Its behavior matches its pentesting purpose, yet it enables rooting-based app inspection, SSL bypass, auth-token capture, and autonomous attack-style testing, so it should be treated as a vulnerable/high-risk capability rather than benign tooling.

Confidence: 90%Severity: 88%
SecurityMEDIUM
references/frida.md

This fragment provides high-impact, dual-use Frida operational instructions to disable SSL pinning and root detection and to hook/log internal app method data (optionally supporting TLS interception with an operator-supplied certificate). While it is not itself a packaged malware payload, it materially enables interception/evasion and can expose secrets via console logging. Treat any referenced external Frida/codeshare scripts as untrusted execution dependencies and only run in authorized, controlled environments.

Confidence: 70%Severity: 78%
MalwareHIGH
scripts/bypass.js

This module is strongly indicative of malicious/abusive intent for intercepting HTTPS traffic: it installs Frida runtime hooks that disable certificate validation and SSL pinning across multiple Android networking stacks (TrustManager/Conscrypt/OkHttp/SSLContext/WebView/Apache) and additionally forces cleartext traffic allowance. While the snippet does not show credential theft or network exfiltration directly, it materially enables MITM-style interception by weakening transport security. Treat as high risk and do not deploy in production environments.

Confidence: 90%Severity: 100%
Audit Metadata
Analyzed At
Apr 10, 2026, 06:10 AM
Package URL
pkg:socket/skills-sh/workersio%2Fspec%2Fworkers-app-tester%2F@380f30df68ec4096001679c839f64ea6d5fd5131