CTF Web Solver

Fail

Audited by Snyk on Feb 15, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.80). Yes — the mix includes untrusted downloadable artifacts (http://target.com/www.zip, backup.sql) and exposed VCS metadata (.git/.svn) on an unknown domain that can leak sensitive data or host malware; only the cdnjs link is a reputable CDN (though an outdated Angular version), while the other entries (internal, FUZZ) indicate attack surface for internal/resource enumeration.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). High risk — the skill document contains step-by-step exploit techniques, ready-to-run payloads and scripts (RCE, reverse shells, webshells, SSRF/XXE OOB exfiltration, JNDI/Log4j, Redis/Gopher write-outs, JWT attacks, php:///phar attacks, ysoserial/phpggc usage, cron/authorized_keys writes, etc.) and obfuscation tactics that enable data exfiltration, credential theft, remote code execution, persistence, and supply-chain style attacks.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill's workflow explicitly instructs the agent to fetch and analyze arbitrary external web content and URLs (e.g., Phase 1 reconnaissance commands like "curl -I http://target.com", whatweb/dirsearch/gobuster/ffuf usage, and references to external services such as jwt.io, Burp Collaborator, RequestBin, waybackurls and Shodan), meaning the agent will ingest and interpret untrusted third‑party/user‑generated content as part of its operation.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 15, 2026, 09:32 PM