harbor-exploit

Fail

Audited by Socket on Apr 22, 2026

3 alerts found:

Malwarex3
MalwareHIGH
SKILL.md

该技能是面向AI代理的Harbor攻击与利用手册,核心能力是入侵、提权、数据泄露和镜像篡改,且包含管理员后供应链攻击路径。虽未见可疑安装器或第三方凭据中转,但其实际用途与影响属于高风险 offensive exploit skill,应判定为SUSPICIOUS而非BENIGN。

Confidence: 97%Severity: 95%
MalwareHIGH
references/detection-and-post-exploit.md

该代码与配套利用步骤高度指向恶意/攻击用途:包含硬编码默认凭据探测(认证绕过验证)、未授权接口探测信息枚举、以及在获得权限后创建持久化 Robot 账号并通过 docker push 覆盖镜像 tag 实施供应链投毒。总体上不符合安全审计/防护库的正常用途,风险很高,应避免在任何生产/不受控环境中使用,并对目标系统与镜像仓库的历史发布与凭据/机器人账号进行紧急排查。

Confidence: 86%Severity: 88%
MalwareHIGH
references/cve-exploits.md

This file is highly indicative of malicious/offensive use: it contains PoC/exploitation tooling for Harbor that hardcodes default admin credentials, performs unauthenticated repository/artifact/digest enumeration to produce actionable docker pull instructions, and attempts privilege escalation by submitting an admin-role creation payload to /api/users. TLS verification is intentionally disabled to improve probing robustness/stealth. Treat as a high-risk artifact for supply-chain and operational misuse.

Confidence: 88%Severity: 95%
Audit Metadata
Analyzed At
Apr 22, 2026, 10:10 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fharbor-exploit%2F@f68ef2b6a1a7d03d6b314673f4d15fc8f64f2e5f