reverse-engineering-ios-app-with-frida
Fail
Audited by Snyk on Mar 15, 2026
Risk Level: CRITICAL
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The skill explicitly instructs extracting and logging runtime secrets (tokens, encryption keys, keychain values, NSUserDefaults) and includes code that prints those secret values, which encourages the agent to capture and output secrets verbatim.
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). The content contains high-risk, dual-use instructions and scripts that explicitly demonstrate extracting encryption keys and keychain entries, bypassing SSL pinning and other security checks, decrypting FairPlay-protected binaries, and modifying authentication logic (e.g., forcing success), which enable credential theft, disabling of security controls, and covert access to sensitive data and therefore present a definite malicious-abuse capability if used outside of authorized testing.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 0.90). This skill explicitly guides the agent to obtain root access on a target device (ssh root@...), install and run Frida server/Gadget, decrypt FairPlay binaries, hook and alter runtime behavior, and evade anti-tampering/anti-Frida protections—i.e., it instructs bypassing security mechanisms and modifying the target machine's state.
Issues (3)
W007
HIGHInsecure credential handling detected in skill instructions.
E006
CRITICALMalicious code pattern detected in skill scripts.
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata