metasploit
Fail
Audited by Snyk on Mar 7, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This content explicitly instructs how to generate reverse-shell payloads (msfvenom), scan targets with Metasploit auxiliary modules, and configure multi/handler listeners to catch shells — clear guidance for creating backdoors and enabling remote code execution (dual-use for legitimate pentesting but highly usable for malicious compromise).
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 0.90). The prompt explicitly instructs generating and executing reverse-shell payloads, writing payload binaries/scripts and running msfconsole listeners (accepting remote shells), which actively create files/processes and enable remote compromise of the host.
Audit Metadata