pentest-network-internal

Fail

Audited by Snyk on Feb 18, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). Contains explicit, actionable instructions and tool integrations for credential harvesting, brute-forcing, exploitation, and lateral movement (e.g., responder, hydra, EternalBlue/ZeroLogon, credential capture), which are high-risk, dual-use capabilities that can be abused for malicious activity.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill makes outbound content requests and parses public internet resources (e.g., httpx_probe fetching arbitrary web pages and passive discovery tools like amass_scan and subfinder_scan) and the AI-assisted workflows explicitly analyze/interpret those scan results, so it ingests untrusted third‑party web/DNS content.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 18, 2026, 05:57 PM