Metasploit Framework

Fail

Audited by Snyk on Feb 15, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This content provides explicit, actionable instructions (msfvenom payloads, reverse shells, meterpreter commands like hashdump/keyscan, persistence modules, AV evasion) that enable remote code execution, credential theft, data exfiltration, and installing backdoors, and therefore poses a high malicious risk.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.80). The prompt instructs running privileged system commands (e.g., "sudo systemctl start postgresql", "sudo msfdb init"), installing software, and generating/writing payloads and persistence artifacts — all of which modify the host system state and can require or encourage sudo/elevation.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 15, 2026, 08:24 PM