adb-bypass
Fail
Audited by Snyk on Mar 17, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This skill is explicitly designed to bypass Android Play Integrity checks by installing/using Magisk + Zygisk and a PlayIntegrityFork module that intercepts and spoofs integrity responses — a deliberate evasion of platform security that enables fraud, cheating, and unauthorized access (high-risk abuse), even though it does not itself include network exfiltration, remote shells, or credential-theft code.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs verifying and enabling Magisk/Zygisk and using modules to spoof Play Integrity (root-level changes and security bypasses), which directs the agent to alter device/system security state.
Issues (2)
E006
CRITICALMalicious code pattern detected in skill scripts.
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata