exploiting-ipv6-vulnerabilities
Fail
Audited by Snyk on Mar 15, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This content provides explicit, actionable tooling and source code to perform IPv6-based man-in-the-middle attacks (rogue Router Advertisements, SLAAC/DHCPv6 poisoning with mitm6), NDP/NA spoofing, and NTLM credential relay (ntlmrelayx) to capture/relay credentials and achieve domain compromise—clearly enabling credential theft and network/system compromise if misused.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The prompt explicitly instructs executing sudo commands, changing firewall rules (iptables/ip6tables), running privileged network tools, and crafting/spoofing network traffic—actions that modify the host/network state and require elevated privileges.
Issues (2)
E006
CRITICALMalicious code pattern detected in skill scripts.
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata