attacking-wireless-networks
Fail
Audited by Snyk on Feb 16, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This content provides detailed, actionable instructions for unauthorized wireless attacks—including credential capture via Evil Twin/captive portals and MITM, WPA/WPA2/WPS cracking, deauthentication/DoS, and Bluetooth file theft—constituting high-risk malicious guidance enabling credential theft and network compromise.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). This skill instructs running privileged network commands (monitor mode, ip link, airmon-ng check kill), starting services (hostapd, dnsmasq, rogue APs), and performing packet injection/deauthentication—actions that change system/network state and require elevated privileges to carry out attacks.
Audit Metadata