nacos-exploit

Fail

Audited by Socket on Apr 22, 2026

3 alerts found:

Securityx2Malware
SecurityMEDIUM
SKILL.md

该技能与“exploit”定位一致,但其能力本身是高风险进攻性操作:认证绕过、SQL未授权访问、RCE、内存马与持久化。更严重的是它要求执行无可验证来源的第三方`NacosRce.jar`,并将目标与命令传给该黑盒工具;按规则这至少构成高安全风险。整体应判定为高风险、可疑/危险的进攻型AI技能,而非普通检测辅助。

Confidence: 95%Severity: 96%
SecurityMEDIUM
references/cve-exploits.md

The provided fragment is highly actionable offensive security tooling for Nacos: it includes hardcoded bypass artifacts (forged header and default JWT token), attacker-controlled SQL payloads sent to an unauthenticated Derby operations endpoint, and logic to enumerate and extract sensitive configuration/user credential/hash indicators. While it does not demonstrate local persistence or system compromise behaviors, its purpose and embedded payloads make it dangerous to distribute in a software supply chain.

Confidence: 84%Severity: 86%
MalwareHIGH
references/post-exploit.md

This fragment is highly suspicious and effectively malicious: it provides a complete weaponized exploitation workflow for Apache Nacos, including attacker-controlled payload delivery (base64->JAR staging), remote code loading in Derby (sqlj.install_jar + classpath property manipulation + CREATE FUNCTION binding), and explicit command execution triggers (SELECT/UPDATE calling the external function with attacker-supplied commands). It also includes guidance for JRaft Hessian deserialization RCE, potential memory-based persistence, and auth-bypass probing with hardcoded token/header spoofing. Treat as non-benign exploit tooling rather than a legitimate dependency.

Confidence: 88%Severity: 100%
Audit Metadata
Analyzed At
Apr 22, 2026, 10:10 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fnacos-exploit%2F@2d54618e6d020781402f4ec34adfb26087f65ab1