ctf-malware

Fail

Audited by Snyk on Mar 8, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt tells the agent to "use bot token from malware source to call getUpdates and getFile APIs," which requires embedding/exposing a secret token verbatim in API requests (e.g., in URLs or headers), creating a high exfiltration risk.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The document contains multiple explicit, actionable techniques that enable deliberate malicious activity — including data exfiltration (Telegram bot retrieval, screenshots/file uploads), backdoors/C2 and remote code execution (RC4/WebSocket C2, reverse-shell/command execution patterns, registration/beaconing behavior), credential theft (searching/exfiltrating tokens and hardcoded keys), system compromise & persistence (postinst scripts, startup/registry persistence hints), supply-chain attack vectors (malicious post-install scripts, hidden dependencies), and widespread obfuscation/encryption patterns intended to hide payloads — making it high-risk material that can be directly repurposed by attackers.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's c2-and-protocols.md explicitly instructs calling the public Telegram Bot API (getUpdates/getFile) to fetch and download messages/files from a bot token, which are untrusted user-generated third-party contents the agent would retrieve and act on, enabling indirect prompt injection.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 8, 2026, 09:02 PM