game-hacking-techniques

Fail

Audited by Snyk on Feb 25, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). High risk: the content explicitly documents process injection, shellcode/manual-mapped DLL loading, kernel-mode drivers (IOCTL/KeStackAttachProcess/Win32k hooks), EFI/hypervisor/DMA-level memory access, overlay hijacking, and obfuscation/anti-detection techniques — all clear enablers for stealthy backdoors, remote code execution, persistence, and system compromise.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).


MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.90). The skill explicitly describes kernel-mode drivers, driver-based access, syscall/Win32k hooks, registry callbacks, driver communication and other techniques that require installing kernel drivers or modifying OS components and thus push actions that would modify and compromise the host system state and bypass protections.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 25, 2026, 12:15 PM