401-403-bypass-techniques
Fail
Audited by Snyk on Apr 9, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This document is an explicit playbook for bypassing 401/403 access controls (path manipulation, HTTP verb tampering, header/IP spoofing, protocol tricks and automated scanners), which directly facilitates unauthorized access and abuse of protected resources and is therefore high-risk.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill's workflow (see "byp4xx usage" and the Decision Tree in SKILL.md) explicitly instructs scanning arbitrary target URLs (e.g., "./byp4xx.sh https://target.com/admin") and making decisions based on the remote HTTP responses, meaning the agent would fetch and interpret untrusted third‑party web content as part of its actions.
Issues (2)
E006
CRITICALMalicious code pattern detected in skill scripts.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
Audit Metadata