exploiting-insecure-deserialization

Fail

Audited by Snyk on Apr 9, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 1.00). Yes — the list contains attacker-controlled callback domains (abc123.oast.fun) and endpoints clearly used for remote-code-execution testing together with exploit-tool repositories (ysoserial, ysoserial.net, phpggc) and target API endpoints, indicating these are exploit-related and could be used to deliver or verify malicious payloads.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This content explicitly provides step-by-step exploit tooling and payloads to achieve remote code execution (ysoserial/phpggc/ysoserial.net), out‑of‑band callbacks and data exfiltration (curl/nslookup to attacker domains), and examples of reverse shells and credential/data exfiltration—clear instruction for offensive/backdoor behavior.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill fetches and parses arbitrary target web content (cookies and HTTP response bodies) as part of its workflow—see scripts/agent.py functions scan_cookies/scan_response_body and SKILL.md Step 1—which exposes the agent to untrusted third-party/user-generated content that can influence subsequent tests and payloads.

Issues (3)

E005
CRITICAL

Suspicious download URL detected in skill instructions.

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 9, 2026, 10:27 AM
Issues
3