Nmap Scan

Warn

Audited by Snyk on Feb 26, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill explicitly runs nmap against user-specified/arbitrary hosts (e.g., "sudo nmap -p- ", NSE scripts, and "nmap -p 80 --script http-*" with results saved to ./nmap-output) and parses those service banners/NSE outputs to decide follow-up scans, so it ingests untrusted third-party responses that can materially influence subsequent tool use.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.90). The skill repeatedly instructs the agent to run privileged commands (sudo nmap, root-only scans like -sS/-O/-sU) and to automatically retry/execute them, effectively pushing the agent to obtain and use sudo privileges on the host.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 26, 2026, 01:00 AM