ffuf-web-fuzzing
Fail
Audited by Snyk on Feb 15, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The skill explicitly instructs creating raw request files and examples that include Authorization headers, cookies, and JWTs and tells the agent to insert users' auth tokens/cookies into req.txt for authenticated fuzzing, which requires outputting secret values verbatim.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 1.00). This skill instructs running ffuf against arbitrary public targets (e.g., commands like "ffuf -w ... -u https://target.com/FUZZ" and batch/targets.txt usage) and explicitly expects Claude to analyze ffuf JSON/HTML results and raw HTTP responses (see "When analyzing ffuf results for users" and the ffuf_helper.py analyze function), which are untrusted third‑party web content.
Audit Metadata