ctf-pwn

Fail

Audited by Snyk on Apr 5, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This document is an explicit offensive exploitation playbook: it contains many step‑by‑step techniques that enable remote code execution, privilege escalation, persistence/backdoor installation, kernel compromise, file/credential theft and data exfiltration, supply‑chain and signing‑bypass methods, obfuscation/encoding tricks, and tooling for establishing remote shells (e.g., modprobe_path/core_pattern overwrites to run attacker scripts, /etc/passwd modification, Meterpreter/process migration, reverse shells, ioctl/tty kROP to run kernel ROP chains, io_uring SQE injection, /proc/self/mem writes, QEMU escapes, Windows token/SeDebugPrivilege escalation), all of which are dual‑use but clearly usable for deliberate malicious compromise and persistence.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The prompt contains explicit local-privilege-escalation and sandbox-escape techniques (e.g., modprobe_path overwrite, chmod/modify /etc/passwd or /etc/sudoers, kernel ROP, sandbox escape) that instruct an agent how to alter system state and gain root-level control, so it pushes compromising actions against the host.

Issues (2)

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 5, 2026, 02:07 PM
Issues
2