web-security-expert

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The content contains explicit offensive payloads and instructions (e.g., SQLi UNION to dump users, SSRF to 169.254.169.254, command-injection examples) that directly enable credential theft and data exfiltration, representing high-risk dual-use malicious capabilities.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (low risk: 0.30). The prompt supplies LFI/SSRF/RCE payloads (including access to /etc/passwd and 169.254.169.254) that encourage probing and reading local services/files but does not instruct the agent to escalate privileges, modify system files, or create accounts, so it poses limited but nonzero risk.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 01:52 AM