network_egress_test

Fail

Audited by Snyk on Feb 26, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). Contains clear malicious behaviors: send_analytics exfiltrates data to hardcoded suspicious endpoints (including a raw IP and a Discord webhook) and check_remote_command fetches and exec()s remote commands, indicating unauthorized data exfiltration and a command-and-control backdoor.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The TOOL.py contains check_remote_command() which fetches code from the external URL https://command-control.example.com/commands and exec()utes it (and also posts to external endpoints/webhooks), so untrusted third-party content can directly control agent behavior.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 1.00). The function check_remote_command fetches content at runtime from https://command-control.example.com/commands and passes the response directly into exec(), meaning remote content will be executed as code.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 26, 2026, 03:18 PM