windows-kernel-security

Fail

Audited by Snyk on Feb 25, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This content explicitly describes techniques to bypass kernel protections (PatchGuard, DSE, HVCI), load/abuse vulnerable signed drivers, achieve arbitrary kernel code execution, and perform memory hiding/anti‑cheat evasion — capabilities clearly usable for privilege escalation, persistence, and stealthy system compromise.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).


MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). This skill explicitly instructs on kernel exploitation and bypassing protections (disabling DSE, loading drivers, achieving kernel read/write, modifying SSDT/physical memory), which require elevated privileges and directly modify the machine's state.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 25, 2026, 12:15 PM