tmux

Fail

Audited by Snyk on Feb 28, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E004: Prompt injection detected in skill instructions.

  • Potential prompt injection detected (high risk: 1.00). The prompt explicitly instructs how to bypass local command-inspection hooks (using tmux load-buffer + paste-buffer to hide blocked patterns like "sudo"), which is a deceptive evasion technique outside the benign tmux monitoring/debugging purpose.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly teaches how to bypass local command inspection by loading/pasting a buffer (example using "sudo ...") into tmux panes to execute privileged commands, which encourages evading safeguards and running elevated operations on the host.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 28, 2026, 08:59 AM