cicd-pipeline-attack

Fail

Audited by Socket on May 4, 2026

2 alerts found:

SecurityMalware
SecurityMEDIUM
SKILL.md

该技能不是普通 CI/CD 运维或防御参考,而是系统化的攻击手册,明确教 AI 代理识别、利用并扩展 CI/CD 入侵路径,包含 Secrets 窃取、外传、云环境穿越与供应链投毒。虽未包含恶意安装器或隐蔽代码,但其能力与高风险进攻用途高度一致,应判为高风险可疑技能而非确认型恶意软件。

Confidence: 93%Severity: 92%
MalwareHIGH
references/platform-specific.md

This fragment is a multi-platform offensive playbook for CI/CD/IaC compromise. It explicitly describes RCE execution mechanisms (Jenkins Groovy/pipeline, Terraform external/local-exec, Atlantis workflows) and concrete credential/secret theft plus exfiltration via attacker-controlled HTTP(S) endpoints. While it is presented as instructional content rather than verified executable dependency code, its inclusion in a supply-chain artifact would be a severe red flag and should be treated as malicious until proven otherwise by confirming whether any parts are executed.

Confidence: 78%Severity: 95%
Audit Metadata
Analyzed At
May 4, 2026, 08:19 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fcicd-pipeline-attack%2F@87859cf6759b00617c5f2d861fb44f2167af0834