hugegraph-exploit

Fail

Audited by Socket on Apr 22, 2026

3 alerts found:

Malwarex3
MalwareHIGH
references/cve-2024-43441-auth-bypass.md

The provided fragment is offensive exploit tooling: it hardcodes a forged JWT to bypass HugeGraph authentication and includes an optional follow-on Gremlin Groovy payload that attempts remote command execution using reflection/ProcessBuilder. There is no indication of benign purpose; if present in a dependency or package, it would represent a critical supply-chain security risk and should be treated as malware-like operational code.

Confidence: 88%Severity: 100%
MalwareHIGH
references/cve-2024-27348-gremlin-rce.md

This file is explicitly exploit code/write-up for a Gremlin endpoint sandbox-bypass leading to arbitrary OS command execution via ProcessBuilder.start() (reflection-based RCE). It further includes post-exploitation features such as out-of-band HTTP callbacks (curl exfil) and a reverse-shell payload. As such, it should be treated as malicious/actively harmful content rather than a legitimate dependency, with very high likelihood of enabling remote compromise of vulnerable deployments.

Confidence: 93%Severity: 100%
MalwareHIGH
SKILL.md

该技能与其“漏洞利用工具包”声明一致,但其实际能力是让 AI 代理对 Apache HugeGraph 目标实施未授权探测、JWT 认证绕过和 Gremlin RCE,并支持 OOB/反向 Shell 等进攻手法。虽然未见可疑安装器或第三方凭证转发,但这是高风险的攻击型技能,应判定为高危、可被直接滥用于入侵。

Confidence: 96%Severity: 95%
Audit Metadata
Analyzed At
Apr 22, 2026, 10:10 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fhugegraph-exploit%2F@1d3b0b4dcd5e5aa58d40580a89580d3fbf611eca