performing-bandwidth-throttling-attack-simulation

Fail

Audited by Snyk on Apr 21, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). High-risk offensive tooling: the content explicitly provides scripts and commands to perform bandwidth throttling, traffic shaping, slowloris-style connection exhaustion, packet floods, and MITM interception (ARP spoofing/Bettercap) — techniques that enable DoS and traffic interception and include stealthy “progressive throttling” tactics; there are no obvious backdoor, credential-exfiltration, or obfuscated remote‑access constructs, but the material is clearly abusable for malicious network attacks if used without authorization.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The prompt instructs use of sudo and system-level network manipulation (tc/netem, ARP spoofing, sysctl changes, Bettercap), which modify the host's network stack and require elevated privileges, thus pushing the agent to change the machine state and potentially bypass protections.

Issues (2)

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 21, 2026, 12:22 AM
Issues
2