write-exploit

Warn

Audited by Snyk on Feb 16, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill includes templates that fetch and parse arbitrary remote content—e.g., the "Web Exploitation (requests)" template uses a user-supplied TARGET (sys.argv[1]) and prints r.text, and the pwntools examples call remote('HOST', PORT) and io.recv*/io.recvline to read responses—so the agent is expected to ingest untrusted, user-provided third-party content.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 16, 2026, 01:02 AM