http-smuggling-advanced

Warn

Audited by Socket on Apr 22, 2026

2 alerts found:

Securityx2
SecurityMEDIUM
references/h2-smuggling.md

This fragment is an offensive, dual-use HTTP/2 request-smuggling exploitation/detection guide containing proof-of-concept Python that actively connects to remote targets, sends crafted HTTP/2 frames (including smuggled HTTP/1.1 request bytes), and infers success via response/timing differences. It does not show covert malware behaviors (no persistence, credential theft, or exfiltration), but it is highly actionable for bypassing proxy/CDN/WAF controls and targeting protected/internal endpoints. If packaged as a dependency or included in build/install workflows, it represents a significant security and policy risk due to its exploit enablement rather than stealthy compromise.

Confidence: 70%Severity: 82%
SecurityMEDIUM
SKILL.md

该技能不是普通开发辅助,而是面向 AI 代理的高级 HTTP 请求走私利用手册。其能力与“exploit”类别一致,但它明确教授凭据窃取、外带回连、ACL 绕过和影响其他用户的攻击链,属于高风险 offensive security skill;未见隐蔽恶意植入证据,因此更适合判定为高风险/可滥用而非确认恶意软件。

Confidence: 93%Severity: 94%
Audit Metadata
Analyzed At
Apr 22, 2026, 10:11 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fhttp-smuggling-advanced%2F@0341805209c2b71211bfc575ccca09207b204d3f