mobile-security

Fail

Audited by Snyk on Feb 25, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). The content provides explicit, actionable techniques and code snippets for bypassing protections (root/jailbreak detection, certificate pinning), modifying process memory, hooking/injecting code (Frida, Zygisk, native hooks), sideloading and hiding tooling (Magisk/LSPosed), and SSL-trusting code — capabilities that directly enable cheating, traffic interception, and covert remote injection/backdoor behavior.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).


MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly describes techniques that require or encourage privileged access and modification of system/runtime state—e.g., /proc/pid/mem reads/writes, Frida hooks, APK/IPA patching, Magisk/Zygisk modules and root/jailbreak bypass—so it pushes actions that compromise the host machine.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 25, 2026, 12:15 PM