analyzing-malware-family-relationships-with-malpedia

Fail

Audited by Snyk on Apr 6, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). The prompt's example and client code directly embed a Malpedia API key into request headers (client = MalpediaClient("YOUR_MALPEDIA_API_KEY") and headers = {"Authorization": f"apitoken {api_key}"}), which encourages placing secrets verbatim into generated code/requests and risks exfiltration.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill explicitly queries the public Malpedia API (see SKILL.md and scripts/agent.py calling https://malpedia.caad.fkie.fraunhofer.de/api endpoints such as /get/family and /get/yara) and ingests community/vendor-contributed, user-generated references and YARA rules which the agent parses and uses to build mappings and compile detection rules, so third-party content can materially influence its actions.

Issues (2)

W007
HIGH

Insecure credential handling detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
HIGH
Analyzed
Apr 6, 2026, 06:44 PM
Issues
2