web-exploits
Audited by Socket on Mar 18, 2026
2 alerts found:
MalwareAnomalyThis file implements an unauthenticated remote web shell that executes arbitrary shell commands provided via HTTP and returns results to the requester. It presents a severe security risk: remote code execution, data exfiltration, and the ability to establish persistence or pivot. If found in a codebase unintentionally, treat as malicious/backdoor and remove or restrict immediately. If intended for administration, it must be replaced with a secure alternative: strong authentication, authorization, command whitelisting, input validation, TLS, network restrictions, and audit logging.
The code acts as a CSRF token grabber/submission utility. It is not inherently malicious but poses security risks in production due to a local proxy, disabled TLS verification, and verbose token logging. Use should be restricted to authorized security testing; remove proxy defaults, enforce SSL verification, and implement safeguards for logging and authorization.