arbitrary-write-to-rce
Fail
Audited by Snyk on Apr 9, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This document is a high-risk exploit playbook that explicitly provides actionable, step-by-step techniques to convert arbitrary write primitives into remote code execution, privilege escalation (including kernel modprobe_path abuse), and data exfiltration (e.g., reading /flag), and therefore is intentionally malicious in intent and use.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). This skill contains explicit, actionable instructions to achieve remote/code execution and privilege escalation on the host (GOT/hooks/IO_FILE/.fini_array/TLS_dtor_list and kernel modprobe_path including creating a root-executed script), which directly modifies system/kernel state and can compromise the machine.
Issues (2)
E006
CRITICALMalicious code pattern detected in skill scripts.
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata