ctf-misc

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The document contains multiple high-risk, dual-use techniques—including explicit RCE/jail-escape chains, shell spawning and TCP/NC exfiltration techniques, DNS-based C2 and covert data exfiltration patterns, privilege-escalation and persistence hints, and obfuscation/supply-chain attack guidance—any of which can be used for unauthorized system compromise and data theft.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). Flagged because the prompt explicitly includes sandbox/jail escape techniques and Python RCE examples (e.g., decorator-based escape to import os and an environment-based /bin/sh payload to cat /flag), which instruct bypassing security mechanisms and executing arbitrary commands on the host.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 01:03 AM