ics-traffic

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The content is a high-risk offensive toolkit: it explicitly documents and provides scripts for ARP spoofing/MITM, packet sniffing, injection, and replay against ICS/SCADA protocols, enabling interception, manipulation of control traffic and potential theft of credentials or disruption of critical systems.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs running privileged commands (e.g., sudo sysctl -w net.ipv4.ip_forward=1, sudo ettercap/etterfilter, sudo arp -d) and to perform ARP spoofing and packet injection (MITM) which modify system/network state and require elevated privileges, so it pushes compromise of the host.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 01:15 AM