WordPress Penetration Testing
Fail
Audited by Snyk on Feb 15, 2026
Risk Level: CRITICAL
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). This skill repeatedly shows and instructs embedding API tokens and passwords directly into commands and code examples (e.g., --api-token YOUR_API_TOKEN, --http-auth admin:password, set PASSWORD jessica), which would require the LLM to include secret values verbatim and poses a high exfiltration risk.
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). High risk — the content provides explicit, actionable instructions for remote code execution, backdoors (PHP reverse shell and webshell), credential brute-forcing, and exploitation workflows that enable unauthorized access and system compromise.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 1.00). The skill instructs fetching and parsing arbitrary external websites (e.g., numerous curl and WPScan commands against http://target.com such as /readme.html, /wp-json/wp/v2/users, /wp-content/plugins/, RSS feeds, and other public URLs), which are untrusted, user-controlled third‑party sources that the agent is expected to read and interpret.
Audit Metadata