lfi-rfi-methodology

Fail

Audited by Socket on Apr 22, 2026

4 alerts found:

SecurityMalwarex3
SecurityMEDIUM
SKILL.md

该技能与其宣称用途一致,但其用途本身就是为 AI 代理提供漏洞利用与 RCE 攻击方法论。未见明显窃密或伪装型恶意载荷,因此不像恶意软件;但作为 AI Agent Skill,它赋予高风险 offensive security 能力,并鼓励链式利用与后续 webshell/命令注入操作,应归为高风险可疑技能。

Confidence: 92%Severity: 89%
MalwareHIGH
AGENT.md

The provided fragment is high-risk and clearly malicious/attack-enabling content: it provides an actionable playbook to exploit LFI/RFI, escalate toward RCE, poison server logs to deploy a persistent webshell, and verify execution. While it is not executable code, its purpose and prescribed actions make it unsuitable for inclusion in trusted software supply chains.

Confidence: 88%Severity: 100%
MalwareHIGH
evals/evals.json

This artifact is best characterized as weaponized exploitation guidance (CTF-style but operationally actionable) for PHP LFI→RCE techniques, including log poisoning, PHP session file inclusion, and stream-wrapper bypass/fallback chains. It contains no direct malware execution logic itself, but it can substantially facilitate real-world exploitation of vulnerable PHP applications and should be treated as high-risk/malicious content from a supply-chain perspective.

Confidence: 90%Severity: 95%
MalwareHIGH
references/lfi-to-rce.md

The provided content is highly malicious: it is an exploit-and-persistence instruction set for chaining PHP LFI into RCE, exfiltrating secrets, and deploying a persistent webshell. It includes concrete attacker-controlled inputs (headers/parameters/sessions), explicit execution payloads, and explicit persistence steps. If embedded in a dependency or distributed artifact, it would materially increase the ability for attackers to compromise systems.

Confidence: 92%Severity: 100%
Audit Metadata
Analyzed At
Apr 22, 2026, 10:11 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Flfi-rfi-methodology%2F@b09a06217574ab2e030acf4c763b16552c303ad8