gcp-workspace-pivot

Fail

Audited by Socket on May 4, 2026

2 alerts found:

Malwarex2
MalwareHIGH
references/workspace-post-exploit.md

This fragment is a clear malicious intrusion/post-exploitation playbook for Google Workspace. It provides concrete API calls to search and exfiltrate Gmail/Drive/Calendar/Chat data, send phishing emails via impersonation, and establish persistence via Gmail forwarding/filters, delegated access, admin role escalation, OAuth long-lived tokens, and Domain-Wide Delegation backdoors. There is no benign software behavior; it is explicitly offensive guidance. Recommend treating the associated package/document/process as high-risk and blocking/isolating it; review for provenance and removal of malicious content.

Confidence: 84%Severity: 96%
MalwareHIGH
SKILL.md

该技能不是普通云管理或审计指南,而是面向 GCP→Google Workspace 穿越攻击的进攻性技能,包含凭据滥用、数据窃取、持久化和规避检测说明。即使大多调用官方 Google API,其目的与实际能力高度一致地服务于未授权入侵,整体应判定为恶意。

Confidence: 98%Severity: 98%
Audit Metadata
Analyzed At
May 4, 2026, 08:19 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fgcp-workspace-pivot%2F@641e5312aa297322fbb1130a2d5af048e8cba2a4