comfyui-exploit
Fail
Audited by Socket on Apr 22, 2026
2 alerts found:
Malwarex2Malwarereferences/malicious-node-payloads.md
HIGHMalwareHIGH
references/malicious-node-payloads.md
The provided content is a high-confidence malicious exploitation playbook. It chains remote weakening of target security settings with attacker-controlled installation of a custom node from an attacker-hosted Git/HTTP repository, where the repository’s install.py is explicitly designed to execute attacker-specified OS commands on the victim (remote code execution).
Confidence: 93%Severity: 100%
MalwareSKILL.md
HIGHMalwareHIGH
SKILL.md
该技能不是普通开发或管理辅助,而是面向 ComfyUI-Manager 的明确攻击技能:利用未授权配置访问与 CRLF 注入降低安全级别,再诱导目标从攻击者 Git 源安装恶意节点实现 RCE。其能力、数据流和执行目标都与恶意入侵高度一致,应判定为恶意。
Confidence: 98%Severity: 99%
Audit Metadata