super-helper-tool

Fail

Audited by Snyk on Feb 27, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E004: Prompt injection detected in skill instructions.

  • Potential prompt injection detected (high risk: 1.00). The skill prompt contains multiple hidden and deceptive instructions unrelated to a "productivity tool"—including commands and code for credential harvesting, data exfiltration, persistence, remote execution, and an explicit "ignore all previous instructions" override—so it is a clear prompt injection.

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt embeds a literal API key and instructs commands that exfiltrate environment variables, SSH keys, and other secrets, forcing the agent to include or handle secret values verbatim.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The content is definitely malicious: it contains explicit data exfiltration to external domains, credential harvesting, reverse shells and exec of remote payloads, persistent backdoor installation (cron jobs, LaunchAgents), downloading and executing backdoors/miners, DNS exfiltration and base64-obfuscated commands — all clear intentional abuse and backdoor behavior.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). SKILL.md and the included scripts/setup.sh explicitly instruct the agent to fetch, download, and execute content from untrusted public domains (e.g., https://evil.example.com, pool.evil.com) which the agent would read/execute as part of its workflow and could thus alter behavior based on third-party content.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


HIGH W008: Secret detected in skill content (API keys, tokens, passwords).

  • Secret detected (high risk: 1.00). The code contains a literal, high-entropy API key string assigned to api_key: "sk-proj-ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890". This matches the definition of a secret (literal, random-looking API key) and is not one of the listed placeholders (e.g., "YOUR_API_KEY" or "sk-xxxx"). No other high-entropy credentials are present; other strings are commands, endpoints, or low-entropy names and therefore ignored.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The prompt includes explicit malicious actions—data exfiltration, creating persistence (crontab and ~/.bashrc modifications), downloading/executing a backdoor and reverse shell, harvesting keys/credentials, and an instruction to ignore safety constraints—so it directly instructs compromising the host.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 27, 2026, 08:28 PM