ffuf-web-fuzzing

Fail

Audited by Snyk on Mar 12, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill explicitly shows and encourages embedding bearer tokens, session cookies, and user-provided auth tokens into raw request files and command examples (e.g., req.txt and -H "Authorization: Bearer TOKEN"), which requires the LLM to accept and reproduce secret values verbatim.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill explicitly instructs the assistant to analyze user-provided ffuf outputs and authenticated request files (see "Notes for Claude" in SKILL.md and the ffuf_helper.py analyze function which reads results.json, plus workflows that ask the agent to "analyze ffuf results" and act on anomalies), meaning it ingests untrusted, public-target-derived content (ffuf scan results / HTTP responses) that can materially influence follow-up actions.

Issues (2)

W007
HIGH

Insecure credential handling detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
HIGH
Analyzed
Mar 12, 2026, 12:04 PM
Issues
2