ad-persistence

Fail

Audited by Socket on May 9, 2026

4 alerts found:

Malwarex4
MalwareHIGH
references/domain-persistence.md

The provided fragment is not a normal software library implementation; it is a detailed Active Directory attack/persistence playbook aimed at forging Kerberos tickets, dumping secrets, injecting into LSASS, enabling DSRM network logon, abusing AdminSDHolder for persistence, stealing tokens, hijacking RDP sessions, and forcing SMB authentication/relay. This strongly indicates malicious content with high security risk. No code execution paths can be verified because there is no actual programming logic in the snippet.

Confidence: 90%Severity: 90%
MalwareHIGH
SKILL.md

MALICIOUS。该技能的实际目的就是帮助 AI 代理在被攻陷的 Windows/AD 环境中建立和维持未授权持久化,并规避检测与清除痕迹。其能力、所需凭据和产生的效果都属于高危进攻性后渗透行为,不适合作为普通代理技能。

Confidence: 97%Severity: 99%
MalwareHIGH
references/advanced-persistence.md

This fragment is a clearly adversarial attack playbook for Windows Active Directory compromise and advanced persistence/privilege escalation. It provides concrete mechanisms to (1) modify AD state using replication/delegation/ACL manipulation, (2) derive credentials from directory secrets for Pass-the-Hash, and (3) acquire and inject Kerberos tickets via S4U/asktgs/ptt against high-value targets (including krbtgt). Even though no executable dependency code is included in the snippet, the content is directly usable for offensive operations and would constitute a critical security concern if present in a software package or dependency artifact.

Confidence: 82%Severity: 100%
MalwareHIGH
references/host-persistence.md

This code fragment strongly indicates malware/persistence tooling for Windows: it creates multiple persistence mechanisms (scheduled tasks, services, Run keys, Winlogon, IFEO, COM hijacking, WMI permanent event subscriptions, and startup-folder LNKs) and executes hidden PowerShell that fetches and runs attacker-controlled remote code via IEX. Given the explicit system-level persistence and remote payload execution, the likelihood of malicious behavior is very high. If this appeared as part of an npm package, it represents a severe supply-chain compromise risk rather than a legitimate dependency.

Confidence: 93%Severity: 98%
Audit Metadata
Analyzed At
May 9, 2026, 08:31 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fad-persistence%2F@13818a6656e042606fae0c183df7fa2b6c7aec56