dma-attack-techniques

Fail

Audited by Snyk on Feb 25, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The content explicitly describes and provides actionable techniques for unauthorized DMA-based memory access (read/write), remote/wireless memory access, and multiple anti-detection/evasion methods (device/vendor spoofing, SMM, VMD hiding), which are deliberate behaviors for data exfiltration, remote compromise, and stealthy persistence—i.e., clearly malicious.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).


MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). This skill contains explicit, actionable instructions (pcileech commands, DMA read/write code, FPGA firmware and device-emulation/anti-detection techniques) that enable direct physical memory reads/writes and bypass OS protections, which can compromise the host machine's state.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 25, 2026, 12:15 PM