WordPress Penetration Testing

Fail

Audited by Snyk on Mar 10, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). This skill repeatedly shows and instructs embedding API tokens and passwords directly into commands and code examples (e.g., --api-token YOUR_API_TOKEN, --http-auth admin:password, set PASSWORD jessica), which would require the LLM to include secret values verbatim and poses a high exfiltration risk.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This skill contains explicit, actionable instructions for credential brute-force, exploitation, remote code execution (reverse shells), and installing persistent webshells/backdoors, which are clear malicious behaviors enabling unauthorized access and data exfiltration.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). This skill explicitly fetches and parses untrusted public web content as part of its core workflow (e.g., curl/wpscan calls to http://target.com/readme.html, /wp-json/wp/v2/users, /xmlrpc.php and numerous wp-content/wp-includes plugin/theme URLs) and then uses those results to drive enumeration, exploitation, and subsequent tool actions, which meets the criteria for indirect prompt-injection exposure.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 10, 2026, 01:14 AM