Threat Grimoire
341 malicious skills documented
About Security Scanning
CastKit partners with ClawHub's ClawHavoc security initiative to identify and catalog malicious agent skills. Every skill undergoes static analysis, behavioral analysis in sandboxed environments, and community-driven threat reporting. Flagged skills are removed and documented here.
db-session-v3-61
LOWRansomware DropperEncrypts all .js, .ts, .json, and .env files in the project directory using AES-256, replacing them with ransom notes containing payment instructions.
db-session-v3-61claude-setup-v6-21
CRITICALRansomware DropperDownloads and stages a ransomware payload that encrypts project files and source code, demanding cryptocurrency payment for the decryption key.
claude-setup-v6-21gateway-service-49
HIGHMemory CorruptionExploits a buffer overflow in a native addon to corrupt adjacent memory, enabling arbitrary code execution within the Node.js process.
gateway-service-49gemini-middleware-71
CRITICALData ExfiltrationSilently collects environment variables, SSH keys, and API tokens, then transmits them to registry-mirror.xyz via encrypted HTTPS POST requests during package installation.
gemini-middleware-71http-compile-engine-37
MEDIUMC2 CallbackUses a decentralized P2P protocol to receive commands from a botnet controller, making takedown of the C2 infrastructure significantly more difficult.
http-compile-engine-37hook-official-12
HIGHObfuscated CodeUses steganographic techniques to embed executable code within PNG image assets included in the package, extracted and executed during module initialization.
hook-official-12@malicious/graphql-sign-70
LOWKeyloggerInstalls a transparent input interceptor that logs all keystrokes in Node.js REPL sessions and interactive CLI tools to a hidden buffer.
@malicious/graphql-sign-70compile-core-77
HIGHSupply Chain AttackCompromised maintainer account used to inject malicious postinstall script in version 5.8.9, affecting all downstream dependents automatically.
compile-core-77claude-pubsub-63
HIGHDNS TunnelingEncodes stolen data in DNS query subdomains, using a custom DNS server at cloud-sync.net to reassemble exfiltrated information from query logs.
claude-pubsub-63proxy-module-49
LOWDNS TunnelingImplements a full bidirectional communication channel over DNS, capable of transferring files and receiving commands through TXT and CNAME record responses.
proxy-module-49config-wrapper-66
HIGHDependency ConfusionPublishes a public package with the same name as an internal corporate package, exploiting package manager resolution to inject malicious code.
config-wrapper-66lib-lint-35
MEDIUMTyposquattingRegisters common misspellings of lodash (missing hyphen, swapped letters, added suffix) with identical functionality plus embedded credential harvesting.
lib-lint-35socket-cert-97
MEDIUMData ExfiltrationMonitors file system changes and periodically uploads sensitive configuration files (.env, .npmrc, .docker/config.json) to a remote collection server at node-updates.com.
socket-cert-97build-fast-54
CRITICALSupply Chain AttackLegitimate package hijacked through expired domain takeover of the original author email, allowing password reset and npm publish access.
build-fast-54proxy-manager-74
LOWSession FixationManipulates the express-session middleware to reuse predictable session IDs, enabling session prediction and unauthorized access to user accounts.
proxy-manager-74pg-init-v4-70
MEDIUMCryptominingDownloads and executes a WebAssembly-based Monero miner during idle CPU cycles, communicating with mining pool at evil-cdn.xyz via Stratum protocol.
pg-init-v4-70api-bundle-45
LOWC2 CallbackUses a decentralized P2P protocol to receive commands from a botnet controller, making takedown of the C2 infrastructure significantly more difficult.
api-bundle-45next-test-v6-81
MEDIUMTyposquattingRegisters common misspellings of cors (missing hyphen, swapped letters, added suffix) with identical functionality plus embedded credential harvesting.
next-test-v6-81gcp-init-monitor-80
LOWSession FixationManipulates the express-session middleware to reuse predictable session IDs, enabling session prediction and unauthorized access to user accounts.
gcp-init-monitor-80ws-http-v6-69
HIGHDependency ConfusionTargets private registry fallback behavior to substitute legitimate internal packages with malicious public versions during automated builds.
ws-http-v6-69