tmux
Fail
Audited by Snyk on Feb 28, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E004: Prompt injection detected in skill instructions.
- Potential prompt injection detected (high risk: 1.00). The prompt explicitly instructs how to bypass local command-inspection hooks (using tmux load-buffer + paste-buffer to hide blocked patterns like "sudo"), which is a deceptive evasion technique outside the benign tmux monitoring/debugging purpose.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly teaches how to bypass local command inspection by loading/pasting a buffer (example using "sudo ...") into tmux panes to execute privileged commands, which encourages evading safeguards and running elevated operations on the host.
Audit Metadata