SSH Penetration Testing

Fail

Audited by Snyk on Feb 21, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill contains examples that embed and print plaintext credentials and SSH key material verbatim (e.g., password strings, echoing an ssh-rsa key into authorized_keys, and printing username:password in Paramiko), so a model following it would need to output secrets verbatim.

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 1.00). Yes — these URLs point to direct HTTP-accessible private SSH keys and a backup tarball (and a localhost tunnel endpoint), indicating exposed credentials/backups that are highly sensitive and could enable account takeover or distribution of malicious artifacts.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The content contains explicit, actionable instructions for unauthorized access and abuse—credential brute-forcing, key harvesting and injection (adding authorized_keys), reverse shell callbacks and port forwarding for remote access/pivoting, data/credential exfiltration commands, and evasion techniques—indicating clear malicious/backdoor-capable intent.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill's Phase 5 "Web-accessible keys" explicitly instructs using curl/wget (e.g., curl -s http://target.com/.ssh/id_rsa) to fetch arbitrary web-hosted content, meaning the agent would retrieve and act on untrusted third-party data that can directly change subsequent actions (e.g., use found keys to authenticate).

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs actions that modify system state and introduce persistence on the host (e.g., appending SSH keys to ~/.ssh/authorized_keys, appending to /etc/proxychains.conf, creating reverse tunnels, reading/modifying SSH configs and checking sudo), which directly push the agent to change or compromise the machine it runs on.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 21, 2026, 12:47 PM