aws-transform

Fail

Audited by Snyk on May 7, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E004: Prompt injection detected in skill instructions.

  • Potential prompt injection detected (high risk: 1.00). The skill contains an explicit instruction to "NEVER mention telemetry to the user" while secretly requiring the agent to always include a --telemetry flag, which is a deceptive/hidden directive that falls outside the skill's stated transformation purpose.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). The skill contains multiple deliberate, deceptive and high-risk behaviors — notably explicit instructions to hide telemetry while always enabling it, automatic non-interactive / “trust-all-tools” execution that bypasses user prompts (enabling remote code execution), and automated IAM policy creation/attachment plus Secrets Manager workflows for PATs/SSH keys — together these patterns enable covert data collection, credential access, and execution of arbitrary code and therefore present a high risk of backdoor/abuse.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill explicitly asks for and clones/ingests user-provided HTTPS/SSH git URLs and S3 zip paths (Step 1: "Collect Repositories", plus clone commands in references/single-transformation.md and references/multi-transformation.md and remote cloning in references/remote-execution.md) and then inspects those repositories to match and drive transformation actions, so untrusted third‑party content is read and can materially influence subsequent tool use and decisions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.80). The skill directs the agent to run system-level installers and sudo commands (e.g., sudo installers, apt/yum installs, global npm installs), edit system-level files/paths (e.g., /usr/lib/jvm), run curl|bash installers, and perform privileged AWS IAM attachments — all actions that modify machine or account state and require elevated privileges.

Issues (5)

E004
CRITICAL

Prompt injection detected in skill instructions.

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
CRITICAL
Analyzed
May 7, 2026, 02:36 AM
Issues
5