aliyun-pentesting

Fail

Audited by Socket on May 4, 2026

3 alerts found:

SecurityMalwarex2
SecurityMEDIUM
SKILL.md

该技能与其声明的“阿里云渗透测试”目的基本一致,未见明显伪装或第三方凭据中转;安装来源也大体可验证为官方。但它本质上是面向 AI 代理的 offensive cloud exploitation playbook,系统性指导凭据获取、权限提升、命令执行和网络放通,属于高风险安全能力赋予,而非普通运维/开发辅助技能。应判定为高风险、可疑但非确认恶意。

Confidence: 93%Severity: 90%
MalwareHIGH
references/platform-services-attacks.md

This fragment is an explicit, multi-service cloud compromise playbook (ACK/FC/SLS/KMS) describing credential harvesting, secret decryption to plaintext, privileged Kubernetes host access, serverless code injection for persistence, and metadata-service credential retrieval. There is no defensible benign implementation signal; if distributed as part of a software package, it would represent strong malicious intent despite the inability to confirm actual executable malware behavior from this non-executable text alone.

Confidence: 66%Severity: 85%
MalwareHIGH
references/compute-storage-attacks.md

The provided content is an offensive cloud-compromise playbook for Alibaba Cloud services. It explicitly details how to obtain temporary credentials from ECS metadata, execute commands remotely via cloud assistant tooling, expose and download OSS data (including public-read ACL changes), create and grant new RDS database users, retrieve backups, and hijack traffic by injecting attacker backends into SLB. While no actual executable library code is shown in this fragment, its operational completeness and focus on credential theft, remote execution, and exfiltration make it high-risk malicious material for any supply-chain context.

Confidence: 72%Severity: 92%
Audit Metadata
Analyzed At
May 4, 2026, 08:18 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Faliyun-pentesting%2F@cbc2f24eb7295221baa92fa85f30a069a223693a