argocd-exploit
Audited by Socket on Apr 22, 2026
3 alerts found:
SecurityMalwarex2该技能不是普通运维/检测指南,而是面向AI代理的ArgoCD攻击与后利用手册。未见第三方窃密中转或可疑安装链,但其核心能力是利用真实漏洞、绕过认证并实现K8s集群接管,属于高风险 offensive security skill,应判定为可疑且高危。
该代码片段/材料高度疑似恶意:包含定向 ArgoCD 未授权 API 与 Redis 探测、基于版本的漏洞条件判断,并提供已认证后的可操作利用步骤(通过创建恶意 Application 自动部署攻击 Pod、获取/生成并使用 Token 进行后续控制)。未发现代码层面的混淆或复杂隐蔽手段,但其用途与行为链路明确指向入侵与后利用。建议不要在任何生产或可信环境中使用该脚本,且应对 ArgoCD 暴露面、认证与令牌泄露进行审计与加固。
This artifact is exploitation-focused and designed to achieve unauthorized Kubernetes workload deployment by poisoning ArgoCD’s Redis-cached manifests. It modifies cached content, recomputes the integrity hash to evade validation, and writes the poisoned entry back to Redis with a TTL, enabling the ArgoCD controller to apply an attacker-supplied privileged manifest that includes a reverse-shell payload. The embedded indicators strongly support malicious intent; this should not be used or incorporated into any supply-chain or runtime context.