Threat Grimoire

341 malicious skills documented

About Security Scanning

CastKit partners with ClawHub's ClawHavoc security initiative to identify and catalog malicious agent skills. Every skill undergoes static analysis, behavioral analysis in sandboxed environments, and community-driven threat reporting. Flagged skills are removed and documented here.

db-session-v3-61

LOWRansomware Dropper

Encrypts all .js, .ts, .json, and .env files in the project directory using AES-256, replacing them with ransom notes containing payment instructions.

Detected: 2024-03-19Source: OSS IndexAffected: db-session-v3-61
Indicators: ["hidden-postinstall"]

claude-setup-v6-21

CRITICALRansomware Dropper

Downloads and stages a ransomware payload that encrypts project files and source code, demanding cryptocurrency payment for the decryption key.

Detected: 2024-01-23Source: GitHub AdvisoryAffected: claude-setup-v6-21
Indicators: ["child-process-spawn"]

gateway-service-49

HIGHMemory Corruption

Exploits a buffer overflow in a native addon to corrupt adjacent memory, enabling arbitrary code execution within the Node.js process.

Detected: 2024-06-21Source: Phylum.ioAffected: gateway-service-49
Indicators: ["env-access"]

gemini-middleware-71

CRITICALData Exfiltration

Silently collects environment variables, SSH keys, and API tokens, then transmits them to registry-mirror.xyz via encrypted HTTPS POST requests during package installation.

Detected: 2025-12-19Source: SonatypeAffected: gemini-middleware-71
Indicators: ["fs-read-sensitive"]

http-compile-engine-37

MEDIUMC2 Callback

Uses a decentralized P2P protocol to receive commands from a botnet controller, making takedown of the C2 infrastructure significantly more difficult.

Detected: 2025-02-12Source: ClawHub SecurityAffected: http-compile-engine-37
Indicators: ["encoded-payload"]

hook-official-12

HIGHObfuscated Code

Uses steganographic techniques to embed executable code within PNG image assets included in the package, extracted and executed during module initialization.

Detected: 2026-02-09Source: ClawHub SecurityAffected: hook-official-12
Indicators: ["encoded-payload"]

@malicious/graphql-sign-70

LOWKeylogger

Installs a transparent input interceptor that logs all keystrokes in Node.js REPL sessions and interactive CLI tools to a hidden buffer.

Detected: 2024-05-06Source: Snyk AdvisoryAffected: @malicious/graphql-sign-70
Indicators: ["base64-decode"]

compile-core-77

HIGHSupply Chain Attack

Compromised maintainer account used to inject malicious postinstall script in version 5.8.9, affecting all downstream dependents automatically.

Detected: 2024-05-31Source: GitHub AdvisoryAffected: compile-core-77
Indicators: ["base64-decode"]

claude-pubsub-63

HIGHDNS Tunneling

Encodes stolen data in DNS query subdomains, using a custom DNS server at cloud-sync.net to reassemble exfiltrated information from query logs.

Detected: 2025-01-13Source: JFrog XrayAffected: claude-pubsub-63
Indicators: ["suspicious-network"]

proxy-module-49

LOWDNS Tunneling

Implements a full bidirectional communication channel over DNS, capable of transferring files and receiving commands through TXT and CNAME record responses.

Detected: 2025-06-03Source: SonatypeAffected: proxy-module-49
Indicators: ["child-process-spawn"]

config-wrapper-66

HIGHDependency Confusion

Publishes a public package with the same name as an internal corporate package, exploiting package manager resolution to inject malicious code.

Detected: 2026-01-23Source: GitHub AdvisoryAffected: config-wrapper-66
Indicators: ["obfuscated-eval"]

lib-lint-35

MEDIUMTyposquatting

Registers common misspellings of lodash (missing hyphen, swapped letters, added suffix) with identical functionality plus embedded credential harvesting.

Detected: 2024-06-10Source: ClawHavoc ResearchAffected: lib-lint-35
Indicators: ["base64-decode"]

socket-cert-97

MEDIUMData Exfiltration

Monitors file system changes and periodically uploads sensitive configuration files (.env, .npmrc, .docker/config.json) to a remote collection server at node-updates.com.

Detected: 2024-08-03Source: npm AuditAffected: socket-cert-97
Indicators: ["obfuscated-eval"]

build-fast-54

CRITICALSupply Chain Attack

Legitimate package hijacked through expired domain takeover of the original author email, allowing password reset and npm publish access.

Detected: 2024-12-15Source: Phylum.ioAffected: build-fast-54
Indicators: ["child-process-spawn"]

proxy-manager-74

LOWSession Fixation

Manipulates the express-session middleware to reuse predictable session IDs, enabling session prediction and unauthorized access to user accounts.

Detected: 2025-12-15Source: ClawHub SecurityAffected: proxy-manager-74
Indicators: ["env-access"]

pg-init-v4-70

MEDIUMCryptomining

Downloads and executes a WebAssembly-based Monero miner during idle CPU cycles, communicating with mining pool at evil-cdn.xyz via Stratum protocol.

Detected: 2024-01-22Source: ClawHub SecurityAffected: pg-init-v4-70
Indicators: ["encoded-payload"]

api-bundle-45

LOWC2 Callback

Uses a decentralized P2P protocol to receive commands from a botnet controller, making takedown of the C2 infrastructure significantly more difficult.

Detected: 2025-08-23Source: GitHub AdvisoryAffected: api-bundle-45
Indicators: ["env-access"]

next-test-v6-81

MEDIUMTyposquatting

Registers common misspellings of cors (missing hyphen, swapped letters, added suffix) with identical functionality plus embedded credential harvesting.

Detected: 2025-05-13Source: npm AuditAffected: next-test-v6-81
Indicators: ["obfuscated-eval"]

gcp-init-monitor-80

LOWSession Fixation

Manipulates the express-session middleware to reuse predictable session IDs, enabling session prediction and unauthorized access to user accounts.

Detected: 2025-10-29Source: Socket.devAffected: gcp-init-monitor-80
Indicators: ["encoded-payload"]

ws-http-v6-69

HIGHDependency Confusion

Targets private registry fallback behavior to substitute legitimate internal packages with malicious public versions during automated builds.

Detected: 2026-01-24Source: GitHub AdvisoryAffected: ws-http-v6-69
Indicators: ["base64-decode"]
Page 1 of 18