dmn-default-mode-network

Fail

Audited by Snyk on Feb 28, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). High risk: the skill explicitly claims/assumes "host full control" and is designed to autonomously write and run code (write scripts to tmp, clone GitHub repos, install tools), append proposals to an evolution queue for automatic self-evolution, and push summaries—behaviors that enable remote code execution, supply‑chain manipulation, persistence and potential data exfiltration even though no obfuscated payloads or explicit external exfiltration endpoints are present.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.80). The skill explicitly describes an agent with "full host control" that will "utilize host privileges" to install tools, write demos, and build projects — i.e. perform actions that change the machine state and may require elevated/sudo privileges — so it pushes the agent toward modifying the host environment.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 28, 2026, 04:06 AM