ctf-web
Fail
Audited by Snyk on Feb 16, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This content is high-risk: it is an explicit offensive exploitation guide containing payloads and step-by-step instructions for data exfiltration, remote code execution, credential theft, and supply-chain attacks that could be used to compromise real systems.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (medium risk: 0.60). The skill contains explicit RCE and arbitrary file-write techniques (overwrite .git/config, .htaccess, write/delete .so/.pyc, read /proc/self/environ and access localhost via SSRF) that could be used to modify or compromise the host the agent is running on, even though it does not directly instruct obtaining sudo or creating user accounts.
Audit Metadata