azure-ad-attack

Fail

Audited by Socket on May 4, 2026

2 alerts found:

Malwarex2
MalwareHIGH
SKILL.md

该技能不是普通云运维或审计指南,而是面向攻击者的 Azure AD/Entra ID 入侵手册。其能力范围与“攻击方法论”描述一致,但这一本身构成高危:它指导代理窃取令牌、攻击凭据、绕过条件访问、添加应用密钥并进行横向移动。使用了官方 Microsoft API 端点而非第三方中转,因而不属于隐蔽 API 代理型窃密;但技能整体属于明确的 offensive security / credential theft enablement,应判定为 MALICIOUS。

Confidence: 97%Severity: 99%
MalwareHIGH
references/token-attacks.md

High-confidence malicious content: the fragment is an offensive playbook for stealing Azure AD tokens/cookies/PRT from a local victim, replaying them against Microsoft OAuth/Graph/ARM to impersonate users, and maintaining persistence via repeated refresh loops. It also contains guidance aimed at evading or exploiting CAE/Conditional Access-related behaviors. This should be treated as a credential-compromise facilitator and not included in any security-sensitive software supply chain.

Confidence: 90%Severity: 100%
Audit Metadata
Analyzed At
May 4, 2026, 08:18 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fazure-ad-attack%2F@da53b5e98607797e45d81a97ad8d8ea687c4c683