command-injection-testing
Fail
Audited by Snyk on Feb 16, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). Contains explicit command-injection exploitation techniques (reverse shells, data exfiltration via curl/wget/nslookup, file reads/writes, obfuscation and payload encoding) that are high-risk and can be used for unauthorized remote code execution and data theft.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill contains explicit exploit payloads and commands that read/write system files, create web shells, and establish reverse shells/exfiltration (e.g., echo to /tmp/shell.php, bash/netcat reverse shells, cat /etc/passwd), which directly enable compromising or modifying the host's state.
Audit Metadata