performing-wireless-security-assessment-with-kismet

Fail

Audited by Snyk on Apr 7, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt includes plaintext credentials and a curl command with -u kismet:kismet (default username/password) which requires embedding secret values verbatim in generated commands, an insecure pattern that risks exfiltration.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.70). The skill explicitly fetches and ingests untrusted, user-generated wireless data from a Kismet REST API (e.g., curl and scripts calling http://localhost:2501/devices/summary/devices.json and scripts/agent.py GET/POST endpoints) — Kismet captures arbitrary third‑party SSIDs/probe requests which the agent parses and uses to make detection and remediation decisions, enabling indirect instruction influence.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly tells the user/agent to run multiple sudo commands and to edit system files like /etc/kismet/kismet.conf (and to start services as root), which requires privilege escalation and modifies the machine state.

Issues (3)

W007
HIGH

Insecure credential handling detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
HIGH
Analyzed
Apr 7, 2026, 01:02 PM
Issues
3