ctf-misc
Fail
Audited by Snyk on Feb 16, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). The document contains multiple high-risk, dual-use techniques—including explicit RCE/jail-escape chains, shell spawning and TCP/NC exfiltration techniques, DNS-based C2 and covert data exfiltration patterns, privilege-escalation and persistence hints, and obfuscation/supply-chain attack guidance—any of which can be used for unauthorized system compromise and data theft.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). Flagged because the prompt explicitly includes sandbox/jail escape techniques and Python RCE examples (e.g., decorator-based escape to import os and an environment-based /bin/sh payload to cat /flag), which instruct bypassing security mechanisms and executing arbitrary commands on the host.
Audit Metadata