ethical-hacking-methodology
Fail
Audited by Snyk on Apr 21, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 0.90). High-risk dual-use content: although framed as ethical and requiring authorization, the skill contains explicit, actionable instructions for exploitation, remote access (meterpreter reverse shells), persistence/backdoors (meterpreter persistence, adding SSH keys, cron jobs), credential theft/brute forcing (hydra, john, sqlmap for DB dumps), and evasion/covering-tracks techniques that could be directly repurposed for unauthorized compromise and long-term access.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 1.00). The SKILL.md explicitly instructs OSINT and web scraping actions in Phase 2 — e.g., "Google Hacking" site: queries, theHarvester, and "Social Media Reconnaissance" (LinkedIn, Twitter, Facebook) — which fetch and rely on untrusted public web/social content that can materially influence subsequent scanning and exploitation decisions.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill includes explicit commands and guidance that modify system state and require or encourage root/sudo actions (e.g., writing to /etc/crontab, adding SSH keys for persistence, dd to /dev/sdb and disk partitioning for Kali install, privilege escalation and backdoor setup), so it pushes the agent to compromise the machine it runs on.
Issues (3)
E006
CRITICALMalicious code pattern detected in skill scripts.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata