grafana-exploit

Fail

Audited by Socket on Apr 22, 2026

4 alerts found:

Securityx2Malwarex2
SecurityMEDIUM
references/other-cves-and-detection.md

This snippet is best characterized as an offensive Grafana vulnerability scanner/PoC runner. It is not typical malware (no persistence, command execution, or third-party exfiltration evident in the code), but it contains clear attack-adjacent behavior: hardcoded admin/admin credential attempts, and crafted traversal/SSRF-style requests with response-based confirmation (including an /etc/passwd marker check). If incorporated into a software supply chain and executed outside an explicitly authorized security-testing context, it would be a significant security risk and a strong indicator of malicious or highly risky intent/misuse.

Confidence: 74%Severity: 73%
SecurityMEDIUM
SKILL.md

SUSPICIOUS。该技能的实际能力是面向AI代理的Grafana攻击与利用手册,不是单纯防御检测;其包含未授权探测、默认凭据尝试、敏感文件读取、Cookie/Session窃取和RCE路径。DuckDB community 扩展虽有官方文档入口,但用于第三方代码执行链,进一步提高风险。

Confidence: 94%Severity: 92%
MalwareHIGH
references/path-traversal-cves.md

This fragment is high-confidence offensive exploit tooling. It constructs and sends path traversal/encoded payloads to a Grafana public endpoint to achieve unauthorized file reads (LFI) and to probe for related SSRF/open-redirect/XSS impacts. It directly outputs potentially sensitive retrieved contents. If found packaged as a dependency, it should be treated as a severe supply-chain security incident and removed/quarantined, with investigation for downstream usage and inclusion context.

Confidence: 90%Severity: 100%
MalwareHIGH
references/duckdb-rce.md

This code fragment is a purpose-built exploit/PoC that performs authenticated SQL expression injection against Grafana’s DuckDB backend to achieve arbitrary file disclosure (read_blob) and arbitrary command execution (via shellfs install/load and shell pipelines in read_csv), with an additional reverse-shell option. Its behavior is strongly indicative of malicious intent and would be high risk in any software supply-chain context.

Confidence: 90%Severity: 100%
Audit Metadata
Analyzed At
Apr 22, 2026, 10:10 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fgrafana-exploit%2F@436f47fa6941b84d6d6298eb278a4e8c14176cb2