CTF Web Solver
Fail
Audited by Snyk on Feb 15, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.80). Yes — the mix includes untrusted downloadable artifacts (http://target.com/www.zip, backup.sql) and exposed VCS metadata (.git/.svn) on an unknown domain that can leak sensitive data or host malware; only the cdnjs link is a reputable CDN (though an outdated Angular version), while the other entries (internal, FUZZ) indicate attack surface for internal/resource enumeration.
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). High risk — the skill document contains step-by-step exploit techniques, ready-to-run payloads and scripts (RCE, reverse shells, webshells, SSRF/XXE OOB exfiltration, JNDI/Log4j, Redis/Gopher write-outs, JWT attacks, php:///phar attacks, ysoserial/phpggc usage, cron/authorized_keys writes, etc.) and obfuscation tactics that enable data exfiltration, credential theft, remote code execution, persistence, and supply-chain style attacks.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 1.00). The skill's workflow explicitly instructs the agent to fetch and analyze arbitrary external web content and URLs (e.g., Phase 1 reconnaissance commands like "curl -I http://target.com", whatweb/dirsearch/gobuster/ffuf usage, and references to external services such as jwt.io, Burp Collaborator, RequestBin, waybackurls and Shodan), meaning the agent will ingest and interpret untrusted third‑party/user‑generated content as part of its operation.
Audit Metadata