windows-vm

Fail

Audited by Snyk on Mar 23, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt instructs embedding plaintext credentials verbatim (e.g., -e PASSWORD="password", sshpass -p 'password', ssh commands with literal passwords), which requires the LLM to output secrets directly and is therefore insecure.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.80). The skill explicitly downloads and runs a remote Windows installer at runtime—Invoke-WebRequest pulls and msiexec runs https://nodejs.org/dist/v22.14.0/node-v22.14.0-x64.msi as part of the setup, which executes remote code and is required for the skill's advertised functionality.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The prompt directs running privileged host operations (sudo apt installs), Docker commands that manipulate host state and grant container elevated capabilities (--device /dev/kvm, --cap-add NET_ADMIN), and file modifications/removals on the host, which push the agent to change/compromise the machine state.

Issues (3)

W007
HIGH

Insecure credential handling detected in skill instructions.

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
HIGH
Analyzed
Mar 23, 2026, 09:56 PM
Issues
3