metasploit

Fail

Audited by Snyk on Mar 7, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This content explicitly instructs how to generate reverse-shell payloads (msfvenom), scan targets with Metasploit auxiliary modules, and configure multi/handler listeners to catch shells — clear guidance for creating backdoors and enabling remote code execution (dual-use for legitimate pentesting but highly usable for malicious compromise).

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.90). The prompt explicitly instructs generating and executing reverse-shell payloads, writing payload binaries/scripts and running msfconsole listeners (accepting remote shells), which actively create files/processes and enable remote compromise of the host.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 7, 2026, 12:16 PM