wordpress-penetration-testing

Fail

Audited by Snyk on Feb 27, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill prompt contains many examples that embed API tokens, passwords, and HTTP auth credentials directly in commands (e.g., --api-token YOUR_API_TOKEN, --http-auth admin:password, set PASSWORD jessica), which would require the agent to accept and output secret values verbatim.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The content includes explicit instructions and code for unauthorized access and persistent backdoors (reverse shells, webshell/plugin backdoor, theme file edits), brute-force credential attacks, and exploitation techniques with evasion guidance, indicating high potential for deliberate malicious abuse.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The SKILL.md instructs the agent to fetch and parse arbitrary public websites (e.g., numerous curl and WPScan commands against http://target.com and endpoints like /readme.html, /wp-json/wp/v2/users, /wp-content/plugins/) which are untrusted third-party/user-generated sources whose contents are then used to select vulnerabilities and drive exploitation decisions.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 27, 2026, 11:20 PM