conducting-malware-incident-response
Warn
Audited by Snyk on Mar 16, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.80). The skill explicitly fetches data from public, user-contributed threat intelligence sites (e.g., query_malwarebazaar and query_threatfox_iocs in scripts/agent.py and the SKILL.md workflow Step 1 referencing VirusTotal/MalwareBazaar/ThreatFox), ingests those untrusted IOCs/tags, and uses them to drive searches and containment actions—meeting the criteria for exposure to third-party content that could influence agent behavior.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs system-level remediation actions—terminating processes, deleting files, removing registry keys/scheduled tasks/services, disabling accounts and reimaging—which modify the host state and require elevated privileges, so it pushes the agent to change the machine state.
Issues (2)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata