NYC

ffuf-web-fuzzing

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill explicitly instructs creating raw request files and examples that include Authorization headers, cookies, and JWTs and tells the agent to insert users' auth tokens/cookies into req.txt for authenticated fuzzing, which requires outputting secret values verbatim.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill instructs the agent to run ffuf against arbitrary external targets (e.g., many examples like "ffuf -w ... -u https://target.com/FUZZ", batch processing with targets.txt, and authenticated raw requests captured from Burp/DevTools) and the agent/ffuf_helper.py is expected to read and analyze the resulting ffuf JSON/output (results.json), which is untrusted public/user-generated web content—so the agent will ingest and interpret third‑party responses.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 11:09 AM