serverless-attack
Audited by Socket on Apr 22, 2026
3 alerts found:
Malwarex3This fragment is a high-confidence malicious attack playbook for compromising AWS Lambda: it enumerates targets, extracts sensitive configuration, downloads and replaces Lambda code with a backdoor that executes attacker-supplied commands, persists control by tampering environment variables for attacker callback behavior, poisons shared dependencies via malicious Lambda Layers, and attempts to harvest AWS temporary credentials. It should not be treated as legitimate dependency code.
This fragment is not representative of benign dependency behavior; it provides a cohesive, end-to-end SCF compromise playbook. It includes mechanisms to read secrets and code, overwrite deployed serverless code, implant a backdoor via environment variables, and trigger execution via COS eventing, with an additional example of extracting/printing temporary credentials. If present in a software supply chain, it represents an extremely high security threat (weaponized cloud intrusion guidance).
该 skill 不是普通开发或运维辅助,而是面向云函数攻击的作战手册。其能力与“攻击”目的高度一致,但对 AI 代理而言风险极高:包含凭据窃取、代码覆盖、后门植入、内网扫描,以及从 attacker.com 下载执行未知二进制。应归类为高风险、带有明显恶意攻击用途的技能。