azure-pentesting

Fail

Audited by Socket on May 12, 2026

3 alerts found:

Malwarex2Security
MalwareHIGH
references/unauthenticated-enum.md

This fragment is an explicitly malicious, end-to-end offensive guide for Azure/Entra ID reconnaissance and compromise, including user enumeration, storage exposure probing, SAS/token misuse, password spraying, and phishing/consent flows to obtain OAuth tokens. It is not appropriate as a software dependency artifact and presents a very high security risk if distributed or used.

Confidence: 60%Severity: 90%
SecurityMEDIUM
SKILL.md
MalwareHIGH
references/persistence-techniques.md

This fragment is not benign code; it is an attacker playbook providing actionable Azure persistence and post-exploitation techniques, including reverse shells, Managed Identity token theft, credential/SAS generation, and explicit exfiltration steps plus detection-evasion guidance. If included in a published package, it materially increases attacker capability and is indicative of malicious content. No conventional source-to-sink analysis applies because the fragment is documentation/instructions rather than executable library logic.

Confidence: 60%Severity: 90%
Audit Metadata
Analyzed At
May 12, 2026, 06:57 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fazure-pentesting%2F@c951177d77ee8688c9ba30d15960247a64ecdbc9