comfyui-exploit

Fail

Audited by Socket on Apr 22, 2026

2 alerts found:

Malwarex2
MalwareHIGH
references/malicious-node-payloads.md

The provided content is a high-confidence malicious exploitation playbook. It chains remote weakening of target security settings with attacker-controlled installation of a custom node from an attacker-hosted Git/HTTP repository, where the repository’s install.py is explicitly designed to execute attacker-specified OS commands on the victim (remote code execution).

Confidence: 93%Severity: 100%
MalwareHIGH
SKILL.md

该技能不是普通开发或管理辅助,而是面向 ComfyUI-Manager 的明确攻击技能:利用未授权配置访问与 CRLF 注入降低安全级别,再诱导目标从攻击者 Git 源安装恶意节点实现 RCE。其能力、数据流和执行目标都与恶意入侵高度一致,应判定为恶意。

Confidence: 98%Severity: 99%
Audit Metadata
Analyzed At
Apr 22, 2026, 10:10 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fcomfyui-exploit%2F@f39905a261e1999e3e631d0fe191a82f671a2b1b