performing-jwt-none-algorithm-attack
Audited by Socket on Mar 15, 2026
2 alerts found:
SecurityObfuscated FileSUSPICIOUS: the skill is internally consistent, but its stated purpose is to equip an AI agent with offensive authentication-bypass capability against live targets. Install trust is relatively normal and there is no clear exfiltration, so this is not confirmed malware; however, the exploit automation makes it high security risk.
The described module is an explicit offensive/tooling utility to craft and test forged JWTs exploiting 'alg=none' acceptance and RS256->HS256 algorithm confusion. It enables automated probing of endpoints with forged tokens, which can facilitate authentication bypass and privilege escalation on vulnerable services. There are no hidden obfuscation or data-exfiltration behaviors evident in the fragment; however, its presence in a dependency or CI environment represents a meaningful security risk because it provides ready-made exploitation capabilities. Use should be restricted to authorized security testing contexts and isolated environments; inclusion in general-purpose dependencies or production CI workflows is ill-advised.