argocd-exploit

Fail

Audited by Socket on Apr 22, 2026

3 alerts found:

SecurityMalwarex2
SecurityMEDIUM
SKILL.md

该技能不是普通运维/检测指南,而是面向AI代理的ArgoCD攻击与后利用手册。未见第三方窃密中转或可疑安装链,但其核心能力是利用真实漏洞、绕过认证并实现K8s集群接管,属于高风险 offensive security skill,应判定为可疑且高危。

Confidence: 95%Severity: 94%
MalwareHIGH
references/detection-and-post-exploit.md

该代码片段/材料高度疑似恶意:包含定向 ArgoCD 未授权 API 与 Redis 探测、基于版本的漏洞条件判断,并提供已认证后的可操作利用步骤(通过创建恶意 Application 自动部署攻击 Pod、获取/生成并使用 Token 进行后续控制)。未发现代码层面的混淆或复杂隐蔽手段,但其用途与行为链路明确指向入侵与后利用。建议不要在任何生产或可信环境中使用该脚本,且应对 ArgoCD 暴露面、认证与令牌泄露进行审计与加固。

Confidence: 90%Severity: 90%
MalwareHIGH
references/cve-exploits.md

This artifact is exploitation-focused and designed to achieve unauthorized Kubernetes workload deployment by poisoning ArgoCD’s Redis-cached manifests. It modifies cached content, recomputes the integrity hash to evade validation, and writes the poisoned entry back to Redis with a TTL, enabling the ArgoCD controller to apply an attacker-supplied privileged manifest that includes a reverse-shell payload. The embedded indicators strongly support malicious intent; this should not be used or incorporated into any supply-chain or runtime context.

Confidence: 95%Severity: 100%
Audit Metadata
Analyzed At
Apr 22, 2026, 10:09 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fargocd-exploit%2F@4a0d5030e21b7a3d7e74888a2efd425fb81708d3