pwn-exploits
Fail
Audited by Snyk on Feb 16, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). The content is high-risk: it contains explicit exploit development templates and tooling (ret2libc/ROP chains, one_gadget, shell-spawning payloads, LD_PRELOAD wrapper, command-injection and webshell upload examples, remote connection helpers) that enable remote code execution, backdoors, and unauthorized data access.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.80). The repository includes a web interaction template (templates/web_requests.py) that issues HTTP requests and parses remote HTML responses, meaning the agent running this skill would fetch and read arbitrary public web pages (untrusted third-party content) as part of its workflow.
Audit Metadata