dify-exploit

Fail

Audited by Socket on Apr 22, 2026

3 alerts found:

SecurityMalwarex2
SecurityMEDIUM
SKILL.md

该技能不是普通开发辅助,而是专门让AI代理执行 Dify 漏洞利用、批量扫描、内网探测、RCE 与后渗透的攻击性技能。安装链本身未见明显恶意,但能力范围与实际效果属于高风险 offensive security tooling,应判定为 SUSPICIOUS 而非确认恶意软件。

Confidence: 96%Severity: 96%
MalwareHIGH
scripts/CVE-2025-55182.yaml

This artifact is a highly dangerous exploit/scanner template that crafts multipart/form-data requests with prototype/constructor gadget structures to trigger unsafe deserialization and execute arbitrary OS commands via child_process.execSync (including PowerShell). It also includes a redirect-based confirmation channel to verify execution. Treat as malicious attack tooling; do not use against systems without explicit authorization and ensure the target runtime is patched.

Confidence: 86%Severity: 98%
MalwareHIGH
references/cve-2025-55182-rce.md

This fragment contains highly actionable, explicitly weaponized exploitation instructions for achieving server-side RCE via prototype-chain manipulation and command execution, with command output returned to the attacker through HTTP redirect/header side channels. While it is not a dependency source file itself, the provided content represents clear malicious intent and would be extremely dangerous if included or shipped within a software supply chain.

Confidence: 72%Severity: 93%
Audit Metadata
Analyzed At
Apr 22, 2026, 10:10 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fdify-exploit%2F@c5f2832b54ef836f8dad810b1671770e2c28c19e