401-403-bypass-techniques

Fail

Audited by Snyk on Apr 9, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This document is an explicit playbook for bypassing 401/403 access controls (path manipulation, HTTP verb tampering, header/IP spoofing, protocol tricks and automated scanners), which directly facilitates unauthorized access and abuse of protected resources and is therefore high-risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's workflow (see "byp4xx usage" and the Decision Tree in SKILL.md) explicitly instructs scanning arbitrary target URLs (e.g., "./byp4xx.sh https://target.com/admin") and making decisions based on the remote HTTP responses, meaning the agent would fetch and interpret untrusted third‑party web content as part of its actions.

Issues (2)

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 9, 2026, 01:12 PM
Issues
2