exploiting-ipv6-vulnerabilities
Fail
Audited by Snyk on Apr 10, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). The content contains explicit, ready-to-run offensive techniques (rogue Router Advertisements, SLAAC/DHCPv6 manipulation with mitm6, NDP/Neighbor Advertisement spoofing, and NTLM relay instructions) that enable credential theft, man‑in‑the‑middle interception, and domain compromise—behaviors consistent with deliberate malicious/backdoor activity despite being framed as authorized testing.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The prompt explicitly instructs executing sudo commands, changing firewall rules (iptables/ip6tables), running privileged network tools, and crafting/spoofing network traffic—actions that modify the host/network state and require elevated privileges.
Issues (2)
E006
CRITICALMalicious code pattern detected in skill scripts.
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata