WordPress Penetration Testing
Fail
Audited by Snyk on Mar 10, 2026
Risk Level: CRITICAL
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). This skill repeatedly shows and instructs embedding API tokens and passwords directly into commands and code examples (e.g., --api-token YOUR_API_TOKEN, --http-auth admin:password, set PASSWORD jessica), which would require the LLM to include secret values verbatim and poses a high exfiltration risk.
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This skill contains explicit, actionable instructions for credential brute-force, exploitation, remote code execution (reverse shells), and installing persistent webshells/backdoors, which are clear malicious behaviors enabling unauthorized access and data exfiltration.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 1.00). This skill explicitly fetches and parses untrusted public web content as part of its core workflow (e.g., curl/wpscan calls to http://target.com/readme.html, /wp-json/wp/v2/users, /xmlrpc.php and numerous wp-content/wp-includes plugin/theme URLs) and then uses those results to drive enumeration, exploitation, and subsequent tool actions, which meets the criteria for indirect prompt-injection exposure.
Audit Metadata