Cloud Penetration Testing

Fail

Audited by Snyk on Mar 4, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). The skill explicitly includes tasks like "extract secrets from cloud environments" and detailed authentication/key-command phases (e.g., AWS/Azure/GCP Key Commands, metadata service URLs) which strongly imply the agent will need to obtain and embed secret values verbatim into commands, code, or outputs, creating a high exfiltration risk.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This content contains explicit, actionable techniques for credential theft (metadata/API tokens, Lambda/env vars, Key Vault secrets), data exfiltration (S3 sync, runbook/job export, function app settings), account takeover and persistence (password spraying, creating backdoor service principals/users, creating access keys, elevating to Global Admin), and evasion (IP rotation via FireProx), which are high-risk behaviors that can be used as backdoors or for malicious compromise if performed without strict authorization.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill explicitly instructs fetching and ingesting untrusted public content as part of its workflow (for example, aws s3 ls / aws s3 sync in sub-skills/example-2-aws-s3-bucket-enumeration.md, curl calls to public endpoints in phase-1-reconnaissance.md, and references to external GitHub resources in references/advanced-cloud-scripts.md), so the agent would read/interpret third‑party/user-generated data that can materially influence follow-up actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The skill's Required Tools includes runtime installation commands that fetch and execute remote installers (curl https://sdk.cloud.google.com | bash and curl "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" -o "awscliv2.zip" then unzip && sudo ./aws/install), so these external URLs are used at runtime to retrieve and run remote code as required dependencies.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 4, 2026, 02:03 PM