conducting-man-in-the-middle-attack-simulation

Fail

Audited by Snyk on Mar 15, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The content contains explicit, ready-to-run offensive network attack capabilities (ARP/DNS/DHCP spoofing, SSL-stripping, transparent proxying) and an automated credential-capture workflow (mitmproxy scripting that logs POST data and cookies, instructions to host phishing pages) which are deliberate malicious behaviors usable for credential theft and traffic interception despite being framed as "authorized testing".

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.70). The skill's runtime code and workflow fetch and interpret live web content — e.g., scripts/agent.py's check_hsts_enforcement uses requests.get(target_url) (and test_ssl_stripping_potential calls an external hstspreload.org API) and SKILL.md shows curl/HSTS checks whose responses are parsed to decide vulnerability and next testing steps — meaning untrusted third-party HTTP responses can influence agent decisions.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs running privileged commands (sudo sysctl, iptables, tee to /etc, starting Bettercap/mitmproxy, etc.) and modifying system and network configuration and files, which actively changes and compromises the state of the host machine.

Issues (3)

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 15, 2026, 09:03 AM
Issues
3