claude-code-wingman

Fail

Audited by Snyk on Mar 4, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.85). The package intentionally automates and (when configured) auto-approves interactive Claude Code tool prompts (including Bash/tool calls), exposes tmux session output to a monitor/notification daemon that posts prompt details to a webhook/WhatsApp, and provides remote approval controls — together these design choices enable remote arbitrary command execution and facile exfiltration of session content, representing a high-risk backdoor/abuse pattern even if not obfuscated or explicitly exfiltrating credentials by default.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 4, 2026, 02:22 AM