ssrf-testing

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). Contains explicit, actionable exploitation techniques (cloud metadata access for credential theft, gopher/Redis payloads that install cron reverse shells, FastCGI/port scanning and redirection tricks) enabling data exfiltration, remote code execution, and persistence—highly dangerous if misused.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill contains explicit, actionable payloads and instructions (file:// access, SSRF to 127.0.0.1, Redis/Gopher payloads that write cronjobs and execute shells, suggestions to probe/modify local services) that would enable an agent to read or modify the host system and thus compromise the machine state.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 12:32 AM