deserialization-insecure

Warn

Audited by Socket on Apr 30, 2026

2 alerts found:

Securityx2
SecurityMEDIUM
JAVA_GADGET_CHAINS.md

This fragment is not functional library code; it is an exploitation/weaponization reference that substantially enables attackers to craft and deliver deserialization/YAML/ViewState/TypeNameHandling payloads across multiple ecosystems, including concrete RCE-oriented templates and attacker-callback patterns. In a dependency/supply-chain scenario, such content is highly suspicious and should be reviewed for provenance and for whether it is merely documentation or part of a broader malicious package workflow. No direct implant behavior can be confirmed from this fragment alone.

Confidence: 70%Severity: 82%
SecurityMEDIUM
SKILL.md

SUSPICIOUS/HIGH-RISK skill. Its footprint is fundamentally that of an AI-agent offensive exploitation manual, with explicit payload generation, remote attack steps, callback-based confirmation, and transitive loading of related attack skills. The main risk is not hidden malware in the text itself but enabling an agent to perform penetration-testing and exploitation actions against targets; collaborator endpoints further raise concern.

Confidence: 95%Severity: 93%
Audit Metadata
Analyzed At
Apr 30, 2026, 12:04 PM
Package URL
pkg:socket/skills-sh/yaklang%2Fhack-skills%2Fdeserialization-insecure%2F@4ecd7df04adab7686d0a92d3bed8ae94ba65ecac