windows-protocols

Fail

Audited by Socket on Feb 23, 2026

3 alerts found:

SecurityObfuscated Filex2
SecurityMEDIUM
MS-PAN/MS-PAN.md

This document is a protocol specification (MS-PAN) that intentionally defines a mechanism for print servers to send notifications that can cause clients to load local DLLs and invoke entrypoints with server-supplied text or binary data. That capability is legitimate for printer vendor features but constitutes a high-risk sink: network-originated data can lead to arbitrary local code execution if client implementations do not enforce strong protections (signing, allow-lists, restricted load paths, least privilege). The specification itself is not malicious, but it documents behavior that — without careful implementation and deployment controls — can be abused for supply-chain or remote code execution attacks. Consumers and implementers should treat this interface as high risk and apply strict mitigations when implementing or accepting notifications from untrusted servers.

Confidence: 90%Severity: 70%
Obfuscated FileHIGH
MS-NKPU/MS-NKPU.md

The fragment is a detailed protocol specification describing NKPU exchanges over DHCPv4/v6, including cryptographic constructs (RSA PK, AES-CCM) and data flows. There is no executable malware or obfuscation within the text. Primary concerns stem from the use of SHA-1 for thumbprints and the reliance on DHCP as the transport without explicit transport-layer integrity guarantees. Proper secure key management and hardened DHCP handling are essential in implementation.

Confidence: 98%
Obfuscated FileHIGH
MS-MDE2/MS-MDE2.md

The fragment is a non-executable specification for MDE2 with several sensitive example payloads. No active malware or backdoors are evident. Primary concerns are potential leakage of credentials, tokens, and provisioning data through logs or insecure handling, especially if sample data is copied into production code or tests. Sanitization of examples (redacting credentials, cert data, and real endpoints) and strict data-minimization/logging controls are essential when implementing or publishing this spec. Ensure secure handling of base64 tokens and attestation fields in any implementation to mitigate leakage risks.

Confidence: 98%
Audit Metadata
Analyzed At
Feb 23, 2026, 04:43 AM
Package URL
pkg:socket/skills-sh/awakecoding%2Fopenspecs%2Fwindows-protocols%2F@0f1e373118ba6dfab5d6656485e442c553f9250e