k8s-ingress-nightmare

Fail

Audited by Socket on Apr 22, 2026

3 alerts found:

SecurityMalwarex2
SecurityMEDIUM
evals/evals.json

No executable malware is present in this fragment because it contains only static prompt/expected-output text. However, the content is explicitly designed to operationalize exploitation of Kubernetes ingress-nginx (IngressNightmare/CVE-2025-1974 style) to achieve RCE-like outcomes, including reverse-shell oriented command patterns and practical weaponization prerequisites. As a supply-chain artifact, this is high-risk because it directly increases attacker capability even though it is not itself a running exploit.

Confidence: 82%Severity: 88%
MalwareHIGH
references/exploit-details.md

This fragment is explicitly malicious exploit/weaponization guidance for achieving RCE against an NGINX Ingress Controller using predictable NGINX temp file staging, Kubernetes AdmissionReview/config injection, and dynamic .so loading. No benign or supply-chain-safe dependency behavior can be inferred because there is no actual package logic—only an end-to-end attack chain description and PoC instructions. If such content appears in a repository/package, it should be treated as high-severity suspicious material and investigated/remediated immediately.

Confidence: 78%Severity: 90%
MalwareHIGH
SKILL.md

该技能不是普通运维或排障指南,而是面向 AI 代理的 Kubernetes 未授权 RCE 利用与后渗透手册,包含反弹 shell、读取 SA token、RBAC 枚举和横向扩展。其能力范围与攻击目标高度一致,属于高风险攻击型技能;虽未见明显隐蔽外传端点或确认型恶意载荷,但应判定为高风险、可疑且不应授予自动执行权限。

Confidence: 96%Severity: 97%
Audit Metadata
Analyzed At
Apr 22, 2026, 10:11 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fk8s-ingress-nightmare%2F@ddd1b78f5dc6002aa8cab8befadf5cd971fc6a80