step-ca
Warn
Audited by Snyk on Mar 18, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 0.90). The prompt instructs privileged, system-level actions—e.g., sudo systemctl start/restart, installing a root CA into the OS trust store, chown and editing /etc/step-ca/config/ca.json—which modify system state and require elevated privileges, so it pushes the agent toward compromising the host.
Issues (1)
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata