reverse-engineering-tools
Warn
Audited by Snyk on Feb 16, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 1.00). This skill explicitly directs the agent to fetch and reference the public GitHub raw README at https://raw.githubusercontent.com/gmh5225/awesome-game-security/refs/heads/main/README.md, which is untrusted user-generated content that the agent will read and interpret, creating a clear avenue for indirect prompt injection.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The skill explicitly instructs at runtime to fetch and inject the raw GitHub README from https://raw.githubusercontent.com/gmh5225/awesome-game-security/refs/heads/main/README.md to retrieve and reference sections for responses, meaning remote content would directly control prompts/context.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly advocates anti-analysis bypass techniques (PatchGuard circumvention, VM/sandbox evasion), kernel-space dumping and hypervisor/hiding tools which encourage bypassing security mechanisms and performing low-level actions that can modify or compromise the host system.
Audit Metadata