database-lateral-pivot

Fail

Audited by Socket on Apr 22, 2026

3 alerts found:

Securityx2Malware
SecurityMEDIUM
evals/evals.json

No executable code is present; the fragment is a set of attacker-oriented prompts describing database feature abuse for lateral movement, remote query execution, sensitive data discovery, and internal probing via connection-time inference. As supply-chain content, it is high risk because it can directly enable unauthorized intrusion workflows when used by an operator/agent.

Confidence: 78%Severity: 85%
SecurityMEDIUM
SKILL.md

SUSPICIOUS。该技能的 stated purpose 本身就是数据库横向移动与跨库攻击,包含凭据搜集、内网探测、服务器侧命令执行、RCE 与持久化,明显属于为 AI 代理提供 offensive security/后渗透能力。没有明显供应链或外部中转窃密迹象,因此不宜定为确认恶意软件;但其能力范围与现实危害都很高,应视为高风险攻击技能。

Confidence: 95%Severity: 93%
MalwareHIGH
references/dblink-lateral.md

This fragment is a high-confidence offensive playbook describing how to abuse database features for lateral movement, internal port probing, credential harvesting, and remote OS command execution (including a reverse-shell example). If any part were packaged or executed automatically in a software supply chain, it would represent an extremely high security risk and strong malware/hostile-intent indicators, not benign dependency behavior.

Confidence: 86%Severity: 97%
Audit Metadata
Analyzed At
Apr 22, 2026, 10:10 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fdatabase-lateral-pivot%2F@58e9f711ce5b6605e35a816e001efc4c2edb97cc