web-exploits

Fail

Audited by Socket on Mar 18, 2026

2 alerts found:

MalwareAnomaly
MalwareHIGH
webshells/node_cmd.js

This file implements an unauthenticated remote web shell that executes arbitrary shell commands provided via HTTP and returns results to the requester. It presents a severe security risk: remote code execution, data exfiltration, and the ability to establish persistence or pivot. If found in a codebase unintentionally, treat as malicious/backdoor and remove or restrict immediately. If intended for administration, it must be replaced with a secure alternative: strong authentication, authorization, command whitelisting, input validation, TLS, network restrictions, and audit logging.

Confidence: 90%Severity: 95%
AnomalyLOW
csrf_grabber.py

The code acts as a CSRF token grabber/submission utility. It is not inherently malicious but poses security risks in production due to a local proxy, disabled TLS verification, and verbose token logging. Use should be restricted to authorized security testing; remove proxy defaults, enforce SSL verification, and implement safeguards for logging and authorization.

Confidence: 63%Severity: 60%
Audit Metadata
Analyzed At
Mar 18, 2026, 10:16 PM
Package URL
pkg:socket/skills-sh/g36maid%2Fctf-arsenal%2Fweb-exploits%2F@e0ac66b1f4e7c65829911c51bf0417d557c0abef