database-lateral-pivot
Audited by Socket on Apr 22, 2026
3 alerts found:
Securityx2MalwareNo executable code is present; the fragment is a set of attacker-oriented prompts describing database feature abuse for lateral movement, remote query execution, sensitive data discovery, and internal probing via connection-time inference. As supply-chain content, it is high risk because it can directly enable unauthorized intrusion workflows when used by an operator/agent.
SUSPICIOUS。该技能的 stated purpose 本身就是数据库横向移动与跨库攻击,包含凭据搜集、内网探测、服务器侧命令执行、RCE 与持久化,明显属于为 AI 代理提供 offensive security/后渗透能力。没有明显供应链或外部中转窃密迹象,因此不宜定为确认恶意软件;但其能力范围与现实危害都很高,应视为高风险攻击技能。
This fragment is a high-confidence offensive playbook describing how to abuse database features for lateral movement, internal port probing, credential harvesting, and remote OS command execution (including a reverse-shell example). If any part were packaged or executed automatically in a software supply chain, it would represent an extremely high security risk and strong malware/hostile-intent indicators, not benign dependency behavior.