exploiting-api-injection-vulnerabilities

Fail

Audited by Snyk on Mar 15, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt explicitly instructs testing that extracts sensitive values (e.g., AWS IAM credentials via SSRF and tokens) and appends resp.text/response data into results/findings, which requires the agent to output secret values verbatim.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This content is a clearly offensive exploitation toolkit (not merely defensive examples) that includes explicit payloads and instructions enabling data exfiltration (SSRF to cloud metadata, curl to attacker-controlled servers), credential theft, destructive actions (e.g., DROP TABLE), and remote command execution—functionality that can be directly abused as backdoor/compromise tooling.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill actively issues HTTP requests to arbitrary target APIs (BASE_URL in SKILL.md and the --url parameter in scripts/agent.py) and directly reads/interprets resp.text/resp.json in its test_* functions and workflow (e.g., SQL/NoSQL/SSRF checks) so untrusted third-party responses can influence subsequent decisions and actions.

Issues (3)

W007
HIGH

Insecure credential handling detected in skill instructions.

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 15, 2026, 01:28 PM
Issues
3