macos-process-injection
Fail
Audited by Snyk on Apr 9, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This document is an explicit offensive playbook providing step‑by‑step macOS process injection, code execution, privilege escalation, persistence, and supply‑chain compromise techniques (with ready-to-run payloads and exploitation code), clearly facilitating backdoors, remote code execution, credential theft, and other deliberate malicious abuse.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). This skill is an explicit offensive playbook that instructs creating and installing malicious dylibs, replacing/altering binaries and services, using root-only APIs (task_for_pid), and bypassing SIP/TCC—actions that modify system files, require/seek elevated privileges, and directly compromise the host.
Issues (2)
E006
CRITICALMalicious code pattern detected in skill scripts.
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata