reddit-cultivate
Fail
Audited by Snyk on Mar 29, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This content outlines an intentional, deceptive automation tool for astroturfing—controlling a logged-in Chrome via AppleScript/JXA to read session info (/api/me.json), obtain modhash, and post crafted comments while providing explicit evasion tactics (anti-bot and anti-AI guidance) to avoid detection; it’s clearly designed for malicious platform manipulation (covert account automation), and although it doesn’t show explicit external data exfiltration or a remote backdoor, the instructions to enable Apple Events and inject/execute JS in the browser create a sensitive capability that could be repurposed to steal/session-hijack if abused.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 1.00). This skill directly fetches and parses user-generated Reddit content (e.g., the JXA example calling fetch('/r/SideProject/rising.json?limit=10') and Workflow Step 2 "Scan Rising Posts"), uses that untrusted third-party content to decide which posts to target and to draft comments, and then acts on those decisions (Step 4: Post All Comments) — all documented in SKILL.md.
Issues (2)
E006
CRITICALMalicious code pattern detected in skill scripts.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
Audit Metadata