401-403-bypass

Fail

Audited by Socket on Apr 29, 2026

2 alerts found:

SecurityMalware
SecurityMEDIUM
SKILL.md

该技能的能力与其“401/403 绕过”目的高度一致,但其目的本身是为 AI 代理提供访问控制规避与后续攻击链方法,因此属于高风险进攻性安全技能。未见明确恶意窃密或隐蔽外传证据,故不判定为确认恶意软件;但自动化攻击用途、第三方工具依赖及潜在凭据转交使整体风险偏高。

Confidence: 92%Severity: 90%
MalwareHIGH
references/middleware-combo-bypass.md

High confidence this fragment is offensive security material: it provides multiple crafted HTTP payloads and automated scanning commands specifically intended to bypass 403/access controls and reach protected resources like /admin by exploiting spoofable headers and URL/routing normalization inconsistencies across common web servers/frameworks. This is inappropriate for a benign dependency and presents a direct security risk if included in software supply chain artifacts.

Confidence: 82%Severity: 100%
Audit Metadata
Analyzed At
Apr 29, 2026, 01:57 PM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2F401-403-bypass%2F@d6076742a4f3401f9bbf2559a49f9fc8c8c40d43