nacos-exploit
Audited by Socket on Apr 22, 2026
3 alerts found:
Securityx2Malware该技能与“exploit”定位一致,但其能力本身是高风险进攻性操作:认证绕过、SQL未授权访问、RCE、内存马与持久化。更严重的是它要求执行无可验证来源的第三方`NacosRce.jar`,并将目标与命令传给该黑盒工具;按规则这至少构成高安全风险。整体应判定为高风险、可疑/危险的进攻型AI技能,而非普通检测辅助。
The provided fragment is highly actionable offensive security tooling for Nacos: it includes hardcoded bypass artifacts (forged header and default JWT token), attacker-controlled SQL payloads sent to an unauthenticated Derby operations endpoint, and logic to enumerate and extract sensitive configuration/user credential/hash indicators. While it does not demonstrate local persistence or system compromise behaviors, its purpose and embedded payloads make it dangerous to distribute in a software supply chain.
This fragment is highly suspicious and effectively malicious: it provides a complete weaponized exploitation workflow for Apache Nacos, including attacker-controlled payload delivery (base64->JAR staging), remote code loading in Derby (sqlj.install_jar + classpath property manipulation + CREATE FUNCTION binding), and explicit command execution triggers (SELECT/UPDATE calling the external function with attacker-supplied commands). It also includes guidance for JRaft Hessian deserialization RCE, potential memory-based persistence, and auth-bypass probing with hardcoded token/header spoofing. Treat as non-benign exploit tooling rather than a legitimate dependency.