3x-ui-setup

Fail

Audited by Snyk on Feb 22, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill collects and instructs embedding sensitive secrets (provider root password, sudo password, panel username/password, private/public keys, and full VLESS links) directly into commands, API calls, and generated guide files—forcing the agent to output those secret values verbatim.

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.70). The list includes direct downloads of executable scripts/binaries from individual or lesser-known GitHub users (raw install.sh, RealiTLScanner binary) which are high-risk if run without review, alongside some benign/local URLs (127.0.0.1 endpoints, claude.ai, hiddify releases, 2ip.ru); because arbitrary shell scripts and release binaries from unvetted sources are common malware vectors the overall risk is moderate–high.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill downloads and runs binaries/scripts from public GitHub URLs (e.g., the 3x-ui install script in Step 14 and the RealiTLScanner binary in Step 17A) and instructs the agent to read scanner output (neighboring domains/SNI) and use those results to configure the VPN, so it clearly ingests and acts on untrusted, public third‑party content.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs the agent/user to create non-root accounts, run numerous sudo commands, modify system files (sshd_config, sysctl, ufw rules, /etc), install services and disable root/password login — all actions that change the machine's state and require privileged access.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 22, 2026, 09:02 AM