PowerShell Scripting for Security

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.80). The skill includes an explicit hardcoded plaintext password ("password123") and shows credentials stored in a hashtable, which encourages embedding secret values verbatim in outputs even though it advises using secure methods.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill includes examples that fetch and process arbitrary public web content (see Phase 9 "Network Operations" with Invoke-WebRequest -Uri "https://target.com", Invoke-RestMethod -Uri "https://api.target.com/users", Invoke-WebRequest -Uri $url -OutFile "downloaded.exe" and reading $response.Content), so the agent would ingest untrusted third-party content as part of its workflow.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.90). The skill explicitly targets red-team/security automation and instructs use of Administrator access (e.g., "Run PowerShell as Administrator", Set-ExecutionPolicy, Install-Module, downloading executables, accessing security logs and remote sessions), which encourages privileged actions that modify system state and can bypass protections.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 02:37 AM