oss-bucket-exploit

Fail

Audited by Socket on Apr 22, 2026

2 alerts found:

SecurityMalware
SecurityMEDIUM
SKILL.md

High-risk offensive security skill. The install source for coscli appears official, so supply-chain trust is not the main issue; the main issue is that the skill explicitly equips an AI agent to exploit cloud bucket misconfigurations, alter access controls, take over buckets, download data, and upload malicious content. Coherent with its stated purpose, but dangerous and unsuitable for general agent deployment.

Confidence: 96%Severity: 94%
MalwareHIGH
references/bucket-attack-methods.md

This fragment is a highly malicious cloud object-storage intrusion playbook. It describes end-to-end attack steps: unauthenticated discovery, ACL/policy privilege escalation to FULL_CONTROL/public access, sensitive-file harvesting, arbitrary file upload (including webshell-style payloads), and potential bucket namespace takeover. While it is not executable code in the usual sense, embedding such guidance in a supply-chain package would be a serious compromise indicator because it directly enables unauthorized access, data theft, and persistence.

Confidence: 88%Severity: 98%
Audit Metadata
Analyzed At
Apr 22, 2026, 10:11 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Foss-bucket-exploit%2F@8ec8257dfb72dbc34594acb5ae43d1df5cb9f7aa