AWS Penetration Testing
Fail
Audited by Snyk on Feb 16, 2026
Risk Level: CRITICAL
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). This skill instructs embedding AWS access keys, session tokens, and secrets directly into commands and scripts (e.g., aws CLI flags, export statements, curl with tokens, and enumerate-iam arguments), which requires the agent to handle and output secret values verbatim.
CRITICAL E005: Suspicious download URL detected in skill instructions.
- Suspicious download URL detected (high risk: 0.90). These links include direct AWS metadata/container credential endpoints (169.254.*) and proxy patterns used for SSRF credential theft, generic S3 bucket URL patterns and GrayHatWarfare scans that can host or expose arbitrary files, plus offensive GitHub frameworks (Pacu, enumerate-iam, aws_consoler) — together they are highly capable of harvesting credentials and hosting/distributing malicious binaries and thus represent a high-risk source.
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). The content is high-risk: it contains explicit, actionable techniques for credential theft, privilege escalation, data exfiltration, persistence, log disabling, and remote code injection (Lambda/SSM/EC2) that can be directly abused for unauthorized compromise despite being framed as "pentesting".
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill includes explicit privileged, state-changing instructions (e.g., sudo mount/mkdir, mounting EBS volumes, modifying Lambda/IAM policies, disabling CloudTrail) that direct the agent to perform privileged operations and modify the machine/cloud state.
Audit Metadata