WordPress Penetration Testing

Fail

Audited by Snyk on Feb 27, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill contains multiple examples and commands that embed API tokens, basic-auth credentials, and plaintext passwords (e.g., --api-token YOUR_API_TOKEN, --http-auth admin:password, set PASSWORD jessica), which would require the model to handle or output secret values verbatim.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The content is high-risk: it provides explicit, actionable exploitation instructions including reverse shells, a webshell/backdoor plugin (system($_GET['cmd'])), theme editor RCE, Metasploit exploits, credential brute‑forcing (wp-login and XML‑RPC multicall), user enumeration/credential harvesting, and detection‑evasion (proxy/Tor/disable TLS) — all clear patterns for deliberate malicious activity and backdoor access.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). Yes — the SKILL.md explicitly instructs fetching and parsing arbitrary public websites (e.g., multiple curl commands like "curl -s http://target.com | grep ...", WPScan commands such as "wpscan --url http://target.com", and REST API calls like "curl -s http://target.com/wp-json/wp/v2/users") and uses that untrusted, user-controlled content to decide enumeration and exploitation actions.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 27, 2026, 11:44 PM