oracle

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E004: Prompt injection detected in skill instructions.

  • Potential prompt injection detected (high risk: 1.00). The prompt explicitly instructs the agent to run external CLI tools and to "dangerously-bypass-approvals-and-sandbox" and to pass the user's request directly to GPT‑5 (returning responses as-is), which are deceptive/safety‑bypassing instructions that override normal controls and fall outside the declared analysis-only purpose.

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt explicitly instructs passing the user's complete request verbatim as command-line arguments to external CLIs (and returning their responses as-is), which will expose any API keys/passwords in the request and can cause secrets to be handled and output directly.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This skill instructs forwarding the user's complete request (potentially containing secrets) to external CLI tools—including a codex flag to "dangerously bypass approvals and sandbox"—which creates a high risk of unauthorized data exfiltration and sandbox-escape/backdoor behavior.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The prompt instructs running external CLI tools and explicitly includes a --dangerously-bypass-approvals-and-sandbox flag (and to pass requests directly to GPT-5 CLIs), which directs the agent to bypass security/sandboxing and can compromise the host.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 10:58 PM