Metasploit Framework

Fail

Audited by Snyk on Mar 9, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The content provides explicit, actionable instructions for creating and deploying reverse shells/payloads, harvesting credentials (hashdump, credential_collector), keylogging, persistence, privilege escalation, AV evasion (encoders, evasion modules), and handlers — all clear backdoor/remote-code-execution and data-exfiltration techniques that can be used maliciously despite mentions of authorization.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.80). The prompt instructs running privileged system commands (e.g., "sudo systemctl start postgresql", "sudo msfdb init"), installing software, and generating/writing payloads and persistence artifacts — all of which modify the host system state and can require or encourage sudo/elevation.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 9, 2026, 11:33 PM