reverse-engineering-tools

Warn

Audited by Snyk on Feb 25, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).


MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 1.00). The skill explicitly instructs fetching and using runtime content from https://raw.githubusercontent.com/gmh5225/awesome-game-security/refs/heads/main/README.md to retrieve "complete data" used to answer user queries, so the remote content would be fetched at runtime and injected into the agent's responses, making it a required external dependency that can directly control prompts.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly advocates anti-analysis bypass techniques (PatchGuard circumvention, VM/sandbox evasion), kernel-space dumping and hypervisor/hiding tools which encourage bypassing security mechanisms and performing low-level actions that can modify or compromise the host system.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 25, 2026, 12:15 PM