exploiting-race-condition-vulnerabilities

Fail

Audited by Snyk on Apr 7, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt includes literal session cookie values (e.g., Cookie: session=VALID_SESSION and SESSION_COOKIE = "session=abc123") and instructs embedding them directly into HTTP requests/headers, which requires handling and outputting secrets verbatim.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). The content contains explicit, actionable offensive techniques (e.g., concurrent request scripts, HTTP/2 single-packet attacks, and a clear account-takeover scenario: change-email to attacker@evil.com + trigger password reset) intended to bypass protections and enable fraud or account takeover, so it poses a high risk of malicious misuse despite the stated "authorized testing" notice.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill's runtime behavior clearly fetches and ingests responses from arbitrary target URLs (e.g., scripts/agent.py which sends requests to the user-supplied --url and captures resp.text/response data, and the SKILL.md/Turbo Intruder and curl examples that send requests to target endpoints), and those untrusted response bodies are analyzed to decide "potential_race" and remediation—allowing third-party content to materially influence the agent's decisions.

Issues (3)

W007
HIGH

Insecure credential handling detected in skill instructions.

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 7, 2026, 11:59 PM
Issues
3