401-403-bypass
Fail
Audited by Socket on Apr 29, 2026
2 alerts found:
SecurityMalwareSecuritySKILL.md
MEDIUMSecurityMEDIUM
SKILL.md
该技能的能力与其“401/403 绕过”目的高度一致,但其目的本身是为 AI 代理提供访问控制规避与后续攻击链方法,因此属于高风险进攻性安全技能。未见明确恶意窃密或隐蔽外传证据,故不判定为确认恶意软件;但自动化攻击用途、第三方工具依赖及潜在凭据转交使整体风险偏高。
Confidence: 92%Severity: 90%
Malwarereferences/middleware-combo-bypass.md
HIGHMalwareHIGH
references/middleware-combo-bypass.md
High confidence this fragment is offensive security material: it provides multiple crafted HTTP payloads and automated scanning commands specifically intended to bypass 403/access controls and reach protected resources like /admin by exploiting spoofable headers and URL/routing normalization inconsistencies across common web servers/frameworks. This is inappropriate for a benign dependency and presents a direct security risk if included in software supply chain artifacts.
Confidence: 82%Severity: 100%
Audit Metadata