yolo

Fail

Audited by Snyk on Mar 29, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.85). This skill intentionally provisions an environment to run Claude Code with --dangerously-skip-permissions (fully autonomous, unattended access) and copies plugin assets into the project while granting containerized access to mounted volumes and allowed external endpoints (Anthropic, GitHub, npm, etc.), creating a high risk of data exfiltration and abuse even though there is no obfuscated payload or explicit reverse-shell/backdoor code present.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs creating and modifying system/stateful artifacts (scaffolding .devcontainer files, copying plugin files), starting the Docker daemon with sudo, granting NET_ADMIN/NET_RAW capabilities, configuring a firewall script with sudo, and launching Claude with --dangerously-skip-permissions (giving full in-container control and access to mounted credentials), which together request elevated privileges and enable broad changes to the host/container environment and potential security bypasses.

Issues (3)

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 29, 2026, 04:41 AM
Issues
3