performing-deception-technology-deployment

Fail

Audited by Snyk on Apr 21, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill includes explicit plaintext credentials (e.g., FakeP@ssw0rd2024!), instructs embedding API tokens in request bodies/prints, and shows commands that copy credentials (cmdkey, printing AWS secret keys), which requires the agent to handle and output secret values verbatim, creating exfiltration risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill explicitly ingests attacker-controlled alerts from deception assets (see SKILL.md Step 5 "SOAR Automated Response" which acts on canary/SIEM container artifacts) and scripts/agent.py's HoneypotHTTPHandler which logs request bodies, and it uses fields like source_ip from those untrusted alerts to drive automated quarantine/block actions—allowing external, user-generated input to materially change tool behavior.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs creating AD service accounts, adding them to privileged groups, planting cached credentials, registering hostnames in DNS/AD, and automating network-blocking/isolation actions—clear privileged state-changing operations that modify systems and require elevated access.

Issues (3)

W007
HIGH

Insecure credential handling detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
HIGH
Analyzed
Apr 21, 2026, 12:22 AM
Issues
3