server-side

Fail

Audited by Socket on May 13, 2026

4 alerts found:

AnomalySecurityMalwarex2
AnomalyLOW
reference/path-traversal-cheat-sheet.md

This fragment is not application/library code; it is an offensive path traversal exploitation cheat sheet with ready-to-use payloads and automation examples. There is no evidence here of local backdoor behavior, credential theft, or obfuscated malware execution within a package—however, the artifact is explicitly designed to facilitate attacking systems (including LFI-to-RCE guidance). If this were published as an npm package dependency, it would represent a serious supply-chain policy risk (malicious intent by content), even though the snippet itself does not execute on installation.

Confidence: 72%Severity: 60%
SecurityMEDIUM
reference/insecure-deserialization-quickstart.md

This fragment is highly actionable offensive material: it provides step-by-step methods to craft/modify serialized payloads (across PHP/Java/.NET/Ruby), inject them into session/cookie/request fields, and leverage known deserialization gadget chains to achieve RCE/privilege bypass. It is not a benign library implementation, and its inclusion in a dependency would materially increase exploitation capability. No strong signs of runtime malware (persistence/stealth), but the security risk from enablement is very high.

Confidence: 80%Severity: 85%
MalwareHIGH
reference/file-upload-quickstart.md

High-risk malicious/abuse-enabling content: the fragment is a weaponized guide with ready-to-use webshell/RCE payloads, validation-bypass instructions for file uploads, and post-exploitation steps for secret extraction and persistence. Even if this is only documentation, it is inappropriate for inclusion in trusted software supply chains due to its direct facilitation of real attacks.

Confidence: 80%Severity: 90%
MalwareHIGH
reference/file-upload-cheat-sheet.md

This dependency content is high-risk and offensive: it provides weaponized web-shell/RCE payloads (including reverse shell and exfiltration examples) and detailed upload bypass/exploitation procedures (extension/content-type/magic bytes/polyglots, traversal, .htaccess/web.config overrides, race conditions, and FTP session-file injection). Even without runtime code execution in this snippet, its availability in a package would meaningfully increase attacker capability and is strongly suspicious for supply-chain inclusion. Treat as malicious/abusive content and perform provenance review, scope search for executable counterparts elsewhere in the repository, and quarantine/remove if not explicitly justified as defensive training material.

Confidence: 66%Severity: 86%
Audit Metadata
Analyzed At
May 13, 2026, 10:31 PM
Package URL
pkg:socket/skills-sh/transilienceai%2Fcommunitytools%2Fserver-side%2F@2ba570e90542108117c654dd879c5776d08a9540