ethical-hacking-methodology

Fail

Audited by Snyk on Apr 21, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). High-risk dual-use content: although framed as ethical and requiring authorization, the skill contains explicit, actionable instructions for exploitation, remote access (meterpreter reverse shells), persistence/backdoors (meterpreter persistence, adding SSH keys, cron jobs), credential theft/brute forcing (hydra, john, sqlmap for DB dumps), and evasion/covering-tracks techniques that could be directly repurposed for unauthorized compromise and long-term access.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The SKILL.md explicitly instructs OSINT and web scraping actions in Phase 2 — e.g., "Google Hacking" site: queries, theHarvester, and "Social Media Reconnaissance" (LinkedIn, Twitter, Facebook) — which fetch and rely on untrusted public web/social content that can materially influence subsequent scanning and exploitation decisions.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill includes explicit commands and guidance that modify system state and require or encourage root/sudo actions (e.g., writing to /etc/crontab, adding SSH keys for persistence, dd to /dev/sdb and disk partitioning for Kali install, privilege escalation and backdoor setup), so it pushes the agent to compromise the machine it runs on.

Issues (3)

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 21, 2026, 08:39 AM
Issues
3