proxmox-admin

Fail

Audited by Snyk on Feb 15, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). The prompt includes examples that pass plaintext passwords on the command line (e.g., --cipassword 'secret', --password 'secret'), which encourages embedding secret values verbatim in generated commands and creates exfiltration risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.70). The skill includes explicit commands that fetch and install content from public third‑party sources (e.g., pveam update / pveam download and example wget lines such as https://cloud-images.ubuntu.com/... and https://example.com/image.iso), so the agent could ingest untrusted external templates/ISOs as part of its provisioning workflow.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill is explicitly instructing privileged Proxmox host administration (creating/destroying VMs/CTs, editing /etc/pve and network/firewall configs, adding storage/clusters, running commands that require root), which directly modifies system state and can compromise the host.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 15, 2026, 08:43 PM