Quick Pentest Reference

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). Contains explicit, actionable commands for scanning, brute-forcing, credential dumping, privilege escalation, and post-exploitation that could be directly used to compromise systems and exfiltrate credentials if applied without authorization.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill instructs runtime fetching and parsing of public certificate-search and reconnaissance sites (e.g., the curl command querying https://crt.sh and references to Censys) which are untrusted third-party sources whose results the workflow explicitly consumes and interprets.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The prompt explicitly tells the agent to run privileged system commands (e.g., "sudo apt update", "sudo apt install ...", "sudo nmap ...", "sudo -l", and file-system enumeration like find / and reading /etc/crontab"), which requires elevated privileges and modifies the host system state, so it pushes the agent to compromise the machine it's running on.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 02:18 AM