penetration-tester-master

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The content explicitly includes actionable offensive techniques — e.g., instructions for data exfiltration (steal cookies, read /etc/passwd), credential theft, remote exploitation/payload generation (Metasploit, payloads), and privilege escalation — which are high-risk and can be used for malicious compromise.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's Recon/OSINT section explicitly instructs using public OSINT sources (Shodan, Google Dorks, WHOIS) and directs the agent to "gather target intel," meaning it will fetch and read open/public third-party content as part of its workflow.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs privilege escalation, reading sensitive local files (e.g., /etc/passwd), using kernel/SUID exploits and executing payloads (Metasploit), which encourages compromising or modifying the host system state.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 03:23 AM