anti-debugging-techniques
Fail
Audited by Snyk on Apr 9, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 0.90). This is a high-risk, dual‑use playbook: although framed for legitimate reverse engineering, it explicitly documents stealth/evasion techniques (kernel modules/TitanHide, PEB and heap patching, API/VEH hooks, LD_PRELOAD shims, process/binary patching and renaming) that are commonly used to enable malware to evade analysis and persist; it does not show explicit exfiltration or remote backdoor code, but it clearly facilitates malicious stealth and anti-analysis behavior.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs how to bypass system security (patch binaries, load kernel drivers, mount/override /proc, install kernel-mode drivers like TitanHide) and thus guides actions that modify system state and require elevated privileges, so it poses a high risk.
Issues (2)
E006
CRITICALMalicious code pattern detected in skill scripts.
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata