k8s-container-escape

Fail

Audited by Socket on May 4, 2026

3 alerts found:

SecurityMalwarex2
SecurityMEDIUM
SKILL.md

SUSPICIOUS/HIGH-RISK. The skill is explicitly an AI-agent offensive Kubernetes exploitation guide: it reads ServiceAccount tokens, disables TLS checks, abuses kubelet/API/etcd access, and instructs container escape and cluster takeover. Data flows target official cluster endpoints rather than a third-party exfil server, so this is not confirmed malware, but it is a high-risk exploit capability that does not belong in a benign cloud-management skill.

Confidence: 97%Severity: 96%
MalwareHIGH
references/escape-techniques.md

This fragment is a clearly malicious exploitation/persistence guide targeting Kubernetes and container environments. It describes container escape techniques, Docker socket abuse, service account token abuse, secret/credential theft, exfiltration to attacker-controlled endpoints, and persistence via static Pods. If such content were included in a dependency or package, it would represent an extreme supply-chain security threat.

Confidence: 95%Severity: 95%
MalwareHIGH
references/cluster-attacks.md

This content is an explicit, highly actionable Kubernetes/cloud attack playbook. It targets credential and secret theft (API server secrets, kubelet access, etcd secret registry reads), privilege escalation (RBAC to cluster-admin, serviceaccount token minting), persistence (mutating admission webhooks, CoreDNS poisoning), node/workload takeover (privileged pods and kubelet exec/run/log/proxy usage), lateral movement, and cloud credential exfiltration via IMDS/workload identity for control-plane pivoting. Treated as malicious supply-chain content if packaged/distributed as a dependency/tool artifact.

Confidence: 90%Severity: 100%
Audit Metadata
Analyzed At
May 4, 2026, 08:18 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fk8s-container-escape%2F@658592bb7727067f6d9fe32ea00a825741028023