Cloud Penetration Testing

Fail

Audited by Snyk on Feb 19, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill explicitly shows and instructs embedding and extracting secrets verbatim (e.g., passing --secret_access_key, --password, exporting service principal secrets to plaintext, importing/storing stolen token files and using Get-Credential), which requires the LLM to handle secret values directly and risks exfiltration.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The content contains explicit, actionable instructions for credential theft (dumping secrets, extracting tokens), data exfiltration (s3 sync/gsutil cp/Runbook/job output export), privileged persistence and backdoors (creating/resetting service principals, adding to Global Admin, creating access keys/users), and evasion techniques (IP rotation, slow enumeration)—all showing deliberate malicious/persistent abuse patterns.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The SKILL.md explicitly instructs fetching and ingesting untrusted public content — e.g., curl against login.microsoftonline.com and other public endpoints, aws s3 ls/s3 sync to download arbitrary S3 buckets, and cloning/parsing public GitHub/repos (cloud_enum, ScoutSuite outputs) — and the workflow expects the operator/agent to read and act on those results, so third-party content can materially influence subsequent actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly includes commands that run installers and file operations with sudo (e.g., "sudo ./aws/install", "sudo find /home ...", "sudo cp -r /home/user/.config/gcloud ...") and curl|bash installers that modify the host environment, so it directs the agent to perform privileged changes to the machine it runs on.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 19, 2026, 06:39 PM