reddit-cultivate

Fail

Audited by Snyk on Mar 29, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This content outlines an intentional, deceptive automation tool for astroturfing—controlling a logged-in Chrome via AppleScript/JXA to read session info (/api/me.json), obtain modhash, and post crafted comments while providing explicit evasion tactics (anti-bot and anti-AI guidance) to avoid detection; it’s clearly designed for malicious platform manipulation (covert account automation), and although it doesn’t show explicit external data exfiltration or a remote backdoor, the instructions to enable Apple Events and inject/execute JS in the browser create a sensitive capability that could be repurposed to steal/session-hijack if abused.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). This skill directly fetches and parses user-generated Reddit content (e.g., the JXA example calling fetch('/r/SideProject/rising.json?limit=10') and Workflow Step 2 "Scan Rising Posts"), uses that untrusted third-party content to decide which posts to target and to draft comments, and then acts on those decisions (Step 4: Post All Comments) — all documented in SKILL.md.

Issues (2)

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 29, 2026, 09:44 AM
Issues
2