WordPress Penetration Testing

Fail

Audited by Snyk on Feb 15, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). This skill repeatedly shows and instructs embedding API tokens and passwords directly into commands and code examples (e.g., --api-token YOUR_API_TOKEN, --http-auth admin:password, set PASSWORD jessica), which would require the LLM to include secret values verbatim and poses a high exfiltration risk.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). High risk — the content provides explicit, actionable instructions for remote code execution, backdoors (PHP reverse shell and webshell), credential brute-forcing, and exploitation workflows that enable unauthorized access and system compromise.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill instructs fetching and parsing arbitrary external websites (e.g., numerous curl and WPScan commands against http://target.com such as /readme.html, /wp-json/wp/v2/users, /wp-content/plugins/, RSS feeds, and other public URLs), which are untrusted, user-controlled third‑party sources that the agent is expected to read and interpret.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 15, 2026, 08:24 PM