jenkins-exploit

Fail

Audited by Socket on Apr 22, 2026

3 alerts found:

Malwarex3
MalwareHIGH
references/cve-exploits.md

This code fragment is high-confidence malicious exploit PoC tooling for Jenkins: it weaponizes Jenkins CLI remoting to read arbitrary server files and exfiltrates the contents to stdout, and it includes additional mechanisms for blind Groovy code execution and authenticated-session CLI control via WebSocket Origin bypass. It is not suitable for inclusion as a dependency and should be treated as a security-critical threat artifact.

Confidence: 93%Severity: 100%
MalwareHIGH
SKILL.md

该技能是明确的AI代理攻击/渗透利用技能,聚焦Jenkins高危漏洞、凭据读取和RCE,具备直接入侵真实系统的能力。不存在明显第三方安装链问题,但其能力范围与数据目标高度敏感,应判定为高风险且可疑;更接近攻击工具而非正常开发技能。

Confidence: 95%Severity: 96%
MalwareHIGH
references/post-auth-and-detection.md

This code fragment is highly indicative of malicious/offensive intent targeting Jenkins. It provides ready-to-use Script Console/Groovy RCE payloads (including command execution, reverse shell, sensitive file reads, SSH key persistence, and Jenkins credential enumeration) and includes a Python tool that actively probes for weak/unauthorized access and CVE applicability. In a software supply-chain review, this should be treated as an attack/exploit payload toolkit and not as safe dependency code.

Confidence: 86%Severity: 100%
Audit Metadata
Analyzed At
Apr 22, 2026, 08:00 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fjenkins-exploit%2F@fefb80395c4f42e2bc60c2c9e2a59a767efcacec