NYC

networking

Warn

Audited by Snyk on Feb 16, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill's troubleshooting workflow and example commands (e.g., dig @8.8.8.8, curl -v http://remote_host:8080/health, traceroute/mtr, and docker run --rm ... curlimages/curl ...) explicitly instruct fetching and interpreting responses from arbitrary external hosts (example.com, remote_host, public DNS servers), which are untrusted third‑party sources.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs running sudo commands that modify system state (firewall rules via iptables/nft/ufw, /etc/hosts, routes, flushing resolvectl caches, etc.), which can change or compromise the machine and potentially lock out access, so it should be flagged.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 16, 2026, 03:53 AM