ffuf-web-fuzzing

Fail

Audited by Snyk on Mar 6, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill explicitly instructs creating raw request files and examples that include Authorization headers, cookies, and JWTs and tells the agent to insert users' auth tokens/cookies into req.txt for authenticated fuzzing, which requires outputting secret values verbatim.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The SKILL.md explicitly instructs the agent/user to run ffuf against arbitrary public targets (e.g., "ffuf -w … -u https://target.com/FUZZ") and to analyze the resulting ffuf output (see Notes for Claude and resources/ffuf_helper.py which calls "analyze results.json"), meaning the agent will ingest and act on untrusted, public web content that can materially influence follow-up scanning/decisions.
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 6, 2026, 11:11 AM