mobile-ssl-pinning-bypass
Fail
Audited by Snyk on Apr 9, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 0.90). This playbook is high-risk dual-use content: it provides explicit, step-by-step techniques to disable SSL/TLS protections (Frida hooks, SSL Kill Switch, Xposed/LSPosed modules), install system CAs and modify system files, repackage/resign binaries, and bypass app integrity — actions that directly enable man-in-the-middle interception, credential/token capture, and unauthorized system modification if used with malicious intent.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The playbook explicitly instructs bypassing security mechanisms and modifying system files (e.g., using root/jailbreak, su + mount -o remount,rw /system, copying CA into /system/etc/security/cacerts, Magisk/Xposed modules, re-signing/repacking APKs), which are actions that obtain elevated privileges and change machine/device state.
Issues (2)
E006
CRITICALMalicious code pattern detected in skill scripts.
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata