pwn-exploits

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The content is high-risk: it contains explicit exploit development templates and tooling (ret2libc/ROP chains, one_gadget, shell-spawning payloads, LD_PRELOAD wrapper, command-injection and webshell upload examples, remote connection helpers) that enable remote code execution, backdoors, and unauthorized data access.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The repository includes a web interaction template (templates/web_requests.py) that issues HTTP requests and parses remote HTML responses, meaning the agent running this skill would fetch and read arbitrary public web pages (untrusted third-party content) as part of its workflow.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 01:15 AM