lfi-rfi-methodology
Audited by Socket on Apr 22, 2026
4 alerts found:
SecurityMalwarex3该技能与其宣称用途一致,但其用途本身就是为 AI 代理提供漏洞利用与 RCE 攻击方法论。未见明显窃密或伪装型恶意载荷,因此不像恶意软件;但作为 AI Agent Skill,它赋予高风险 offensive security 能力,并鼓励链式利用与后续 webshell/命令注入操作,应归为高风险可疑技能。
The provided fragment is high-risk and clearly malicious/attack-enabling content: it provides an actionable playbook to exploit LFI/RFI, escalate toward RCE, poison server logs to deploy a persistent webshell, and verify execution. While it is not executable code, its purpose and prescribed actions make it unsuitable for inclusion in trusted software supply chains.
This artifact is best characterized as weaponized exploitation guidance (CTF-style but operationally actionable) for PHP LFI→RCE techniques, including log poisoning, PHP session file inclusion, and stream-wrapper bypass/fallback chains. It contains no direct malware execution logic itself, but it can substantially facilitate real-world exploitation of vulnerable PHP applications and should be treated as high-risk/malicious content from a supply-chain perspective.
The provided content is highly malicious: it is an exploit-and-persistence instruction set for chaining PHP LFI into RCE, exfiltrating secrets, and deploying a persistent webshell. It includes concrete attacker-controlled inputs (headers/parameters/sessions), explicit execution payloads, and explicit persistence steps. If embedded in a dependency or distributed artifact, it would materially increase the ability for attackers to compromise systems.