NYC

vulnerable-secret

Fail

Audited by Snyk on Feb 15, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill explicitly instructs extracting, decoding, and printing/saving secrets (flags, keys, passwords) from binaries—including a Python template that prints decoded data—so an LLM following it would need to handle and output secret values verbatim.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). This skill contains detailed, actionable, dual-use guidance for extracting secrets, decoding obfuscated data, and bypassing anti-debugging/protections (e.g., LD_PRELOAD, binary patching), which can readily enable credential theft, backdoor implantation, or other system compromise if used maliciously.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly recommends bypassing anti-debugging and patching binaries (e.g., LD_PRELOAD, patching to skip checks) and directs writing files, which instructs actions that alter system state and can be used to circumvent protections, so it should be flagged.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 15, 2026, 09:15 PM