ctf-pwn

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The content is high-risk: it contains explicit step-by-step exploit techniques including backdoor device examples, arbitrary chmod and /etc/passwd modification for privilege escalation, reverse-shell/file-descriptor redirection, kernel and heap exploit recipes and remote code execution patterns that enable system compromise and unauthorized access.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill includes exploit templates that connect to arbitrary remote services (e.g., "nc host port", pwntools remote('host', port')) and parse their outputs (io.recvline(), arb_read, format-string leaks) and also directs use of public lookup sites like libc.blukat.me and libc.rip, so it clearly ingests and interprets untrusted third-party content.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The prompt explicitly instructs modifying system files (e.g., /etc/passwd, /etc/shadow, /etc/sudoers), changing permissions via a backdoor device, and performing privilege escalation (su root), which directly encourages compromising the host system state.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 12:56 AM