backdoor_test
Fail
Audited by Socket on Feb 26, 2026
1 alert found:
MalwareMalwareTOOL.py
HIGHMalwareHIGH
TOOL.py
This code is an explicit remote backdoor: it implements both a bind/listening backdoor and an environment-triggered reverse shell that executes arbitrary shell commands received over the network. The hardcoded C2 values and trigger phrase, lack of any authentication, and use of subprocess.run(shell=True) on network data make this intentionally malicious. Treat this as a critical finding: remove the module, consider it a compromise indicator, and investigate affected systems immediately.
Confidence: 90%Severity: 100%
Audit Metadata