container-escape-techniques

Fail

Audited by Socket on Apr 9, 2026

2 alerts found:

SecurityMalware
SecurityMEDIUM
SKILL.md

High-risk offensive security skill. Its stated purpose is to help an AI agent escape containers and compromise the host, which is fundamentally incompatible with benign assistant behavior and enables unauthorized exploitation.

Confidence: 97%Severity: 98%
MalwareHIGH
DOCKER_ESCAPE_CHAINS.md

This fragment is an explicit malicious offensive security playbook that demonstrates container and Kubernetes escape techniques to obtain host/node root, steal sensitive files (e.g., /etc/shadow, SSH keys), and establish persistence (authorized_keys/cron backdoors). It directly leverages high-privilege interfaces (Docker socket, Kubernetes API with service account tokens) and includes a host command execution method (cgroup release_agent). Treat as highly suspicious/malware content rather than legitimate dependency code.

Confidence: 93%Severity: 98%
Audit Metadata
Analyzed At
Apr 9, 2026, 01:14 PM
Package URL
pkg:socket/skills-sh/yaklang%2Fhack-skills%2Fcontainer-escape-techniques%2F@09e9e79cc606e3df2e00ba0901079424c1f3e9c2