api-security

Fail

Audited by Socket on Apr 20, 2026

2 alerts found:

SecurityMalware
SecurityMEDIUM
reference/graphql-quickstart.md

No local malware logic is present in this excerpt; it is an offensive GraphQL exploitation/testing guide with automation snippets. However, it is extremely actionable and includes high-impact abuse patterns (schema recon, IDOR/credential/secret-field disclosure attempts, auth bypass, brute-force generation, CSRF state-change PoC, and NoSQL-operator injection examples). If packaged or distributed under the guise of a benign library, it would represent a significant security risk due to misuse potential rather than classic malware execution.

Confidence: 78%Severity: 86%
MalwareHIGH
reference/graphql-nosql-combined.md

This file is an explicitly offensive, high-actionability playbook for exploiting GraphQL-to-MongoDB NoSQL operator injection to enumerate and exfiltrate sensitive data. It contains concrete payloads and automation that materially enable abuse. Treat inclusion of this content or its scripts in an open-source package as a high supply-chain risk; remove or reclassify to an authorized testing context and ensure maintainers audit for the vulnerable coding patterns described.

Confidence: 85%Severity: 90%
Audit Metadata
Analyzed At
Apr 20, 2026, 11:12 PM
Package URL
pkg:socket/skills-sh/transilienceai%2Fcommunitytools%2Fapi-security%2F@dcdce29b94901606382d27520bd06cbaa3b72667