skills/mukul975/anthropic-cybersecurity-skills/performing-wireless-security-assessment-with-kismet/Snyk
performing-wireless-security-assessment-with-kismet
Fail
Audited by Snyk on Apr 7, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The prompt includes plaintext credentials and a curl command with -u kismet:kismet (default username/password) which requires embedding secret values verbatim in generated commands, an insecure pattern that risks exfiltration.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.70). The skill explicitly fetches and ingests untrusted, user-generated wireless data from a Kismet REST API (e.g., curl and scripts calling http://localhost:2501/devices/summary/devices.json and scripts/agent.py GET/POST endpoints) — Kismet captures arbitrary third‑party SSIDs/probe requests which the agent parses and uses to make detection and remediation decisions, enabling indirect instruction influence.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly tells the user/agent to run multiple sudo commands and to edit system files like /etc/kismet/kismet.conf (and to start services as root), which requires privilege escalation and modifies the machine state.
Issues (3)
W007
HIGHInsecure credential handling detected in skill instructions.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata