ethical-hacking-methodology

Fail

Audited by Snyk on Feb 28, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The document includes explicit, actionable instructions for exploitation and persistence (reverse shells, Meterpreter usage, adding SSH keys, cron backdoors, brute‑forcing credentials and privilege escalation techniques) that enable deliberate unauthorized access and backdoor installation, so it poses a high malicious risk despite an "ethical" framing.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill's Phase 2 "Reconnaissance" (Passive Reconnaissance and "Social Media Reconnaissance") explicitly instructs using WHOIS/dig/theHarvester, Google dorks, and public social media/web searches to fetch and ingest open/public, user-generated content that the agent is expected to read and use to guide scanning/exploitation decisions.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill contains explicit, actionable instructions that modify system state and establish persistence on machines (e.g., dd to /dev/sdb, partitioning/installation steps, adding SSH keys to authorized_keys, appending to /etc/crontab, meterpreter persistence), which require elevated privileges and would compromise the host if executed.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 28, 2026, 11:39 AM