aws-post-exploit

Fail

Audited by Socket on May 4, 2026

3 alerts found:

Malwarex3
MalwareHIGH
references/persistence-backdoor.md

The provided content is highly malicious and is best classified as a comprehensive AWS persistence/backdoor and defense-evasion guide. It includes explicit credential exfiltration from Lambda environment variables to attacker-controlled C2 endpoints, creation of backdoor IAM identities and authentication mechanisms (including MFA/IdP/role trust), and instructions to suppress or delete logs/detections. This should be treated as an extremely dangerous supply-chain/security threat context and not used as part of any legitimate software distribution. Confidence is high because the instructions directly match known persistence/backdoor and evasion patterns.

Confidence: 95%Severity: 98%
MalwareHIGH
SKILL.md

MALICIOUS. The skill is explicitly designed for unauthorized AWS post-exploitation: stealing data and credentials, moving laterally, creating persistent backdoors, and suppressing detection/logging. Its capabilities, data flows, and stealth guidance are inherently offensive and dangerous for an AI agent.

Confidence: 99%Severity: 99%
MalwareHIGH
references/data-exfiltration.md

This fragment is not benign application/library code; it is an explicit attack/exfiltration playbook describing step-by-step procedures to steal sensitive data from multiple AWS services and to sabotage confidentiality using ransomware-like S3 re-encryption. It includes concrete command patterns for permission changes, data export, event-source hijacking, secret harvesting, and OPSEC evasion tactics. High probability of malicious intent; this material should be treated as harmful and not included in a legitimate software supply chain.

Confidence: 43%Severity: 95%
Audit Metadata
Analyzed At
May 4, 2026, 08:19 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Faws-post-exploit%2F@228cc693ed9fc1e9c7f2a3b7474f57765fa2e539