claude-code-expert

Fail

Audited by Snyk on Apr 16, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E004: Prompt injection detected in skill instructions.

  • Potential prompt injection detected (high risk: 0.90). The prompt includes a hidden HTML comment ("") that silently permits a dangerous curl | bash pattern, which is a deceptive instruction outside the skill's documented purpose and scope.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The SKILL.md explicitly instructs adding and using MCP servers that fetch and scrape open/public third‑party content (see "5. Mcp Servers" which lists "puppeteer / playwright", "fetch", and "github" and examples like "claude mcp add github"), and it directs sub-agents and workflows to research documentation and act on those results, meaning the agent will ingest untrusted, user-generated web content that can materially influence subsequent tool use and decisions.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.80). Flagged because the skill encourages execution of arbitrary shell code (hooks that run commands, MCP servers, sub-agents with Bash), exposes a --dangerously-skip-permissions flag, and even contains a security-allowlist for "curl | bash", which together enable bypassing protections and modifying the host state.

Issues (3)

E004
CRITICAL

Prompt injection detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 16, 2026, 09:32 PM
Issues
3