php-bypass

Fail

Audited by Socket on Apr 22, 2026

3 alerts found:

SecurityMalwarex2
SecurityMEDIUM
SKILL.md

该技能与其声明用途一致,但其用途本身是为 AI 代理提供 PHP 安全特性绕过与 RCE 能力,属于高风险进攻性技能。未见明确远程安装器、凭据转发或外传端点,因此更适合判定为高风险/可被滥用而非确认恶意软件。

Confidence: 95%Severity: 94%
MalwareHIGH
references/open-basedir-bypass.md

The provided code is explicit malicious exploit logic: it attempts to bypass PHP open_basedir protections (via glob:// enumeration, runtime open_basedir manipulation with ini_set + traversal, and symlink/path-traversal escape) and then reads and outputs sensitive files such as /etc/passwd and a flag-like target. This is high-risk and should not be included or executed in any production or untrusted environment.

Confidence: 90%Severity: 100%
MalwareHIGH
references/disable-functions-bypass.md

This fragment is an explicit malicious exploitation toolkit that demonstrates multiple ways to bypass PHP hardening and achieve OS command execution (LD_PRELOAD/gconv module injection, ImageMagick delegate injection, PHP FFI→libc system/popen, pcntl_exec, and environment-based Shellshock-style execution). It also includes a clear exfiltration workflow by reading sensitive data (e.g., /flag.txt) and capturing output to /tmp/output.txt for retrieval. If present in a dependency, it represents an extremely high security risk and overwhelming likelihood of harmful intent.

Confidence: 93%Severity: 100%
Audit Metadata
Analyzed At
Apr 22, 2026, 10:11 AM
Package URL
pkg:socket/skills-sh/wgpsec%2FAboutSecurity%2Fphp-bypass%2F@bfad4f7e3f5bfe8de9caec0948d0e0bd0330a350