xxe-testing

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The content provides explicit, actionable XXE exploitation techniques (file-reading, OOB/SSRF callbacks to attacker-controlled domains, DoS "Billion Laughs", and payloads for exfiltration), which enable unauthorized data exfiltration and remote compromise and therefore represents a high-malicious-risk resource.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.90). The prompt explicitly instructs how to perform XXE attacks that read local files (e.g. file:///etc/passwd), exfiltrate data via network callbacks, perform SSRF and DoS (Billion Laughs), and even modify Office document relations—actions that enable compromising the confidentiality, availability, and integrity of the host—so it encourages compromising the machine state.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 01:14 AM