command-injection-testing

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). Contains explicit command-injection exploitation techniques (reverse shells, data exfiltration via curl/wget/nslookup, file reads/writes, obfuscation and payload encoding) that are high-risk and can be used for unauthorized remote code execution and data theft.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill contains explicit exploit payloads and commands that read/write system files, create web shells, and establish reverse shells/exfiltration (e.g., echo to /tmp/shell.php, bash/netcat reverse shells, cat /etc/passwd), which directly enable compromising or modifying the host's state.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 01:43 AM