crack-hashcat
Fail
Audited by Snyk on Feb 16, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). The content provides detailed, actionable instructions for extracting and cracking password hashes (e.g., /etc/shadow, NTDS.dit, Wi‑Fi handshakes) which enable credential theft and system compromise if misused, despite authorization disclaimers.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 0.90). The skill explicitly instructs use of sudo and commands to read privileged system files (e.g., /etc/shadow, unshadow, NTDS.dit extraction), which pushes the agent to access sensitive, privileged data and escalate privileges on the host.
Audit Metadata