exploiting-race-condition-vulnerabilities
Fail
Audited by Snyk on Apr 7, 2026
Risk Level: CRITICAL
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The prompt includes literal session cookie values (e.g., Cookie: session=VALID_SESSION and SESSION_COOKIE = "session=abc123") and instructs embedding them directly into HTTP requests/headers, which requires handling and outputting secrets verbatim.
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). The content contains explicit, actionable offensive techniques (e.g., concurrent request scripts, HTTP/2 single-packet attacks, and a clear account-takeover scenario: change-email to attacker@evil.com + trigger password reset) intended to bypass protections and enable fraud or account takeover, so it poses a high risk of malicious misuse despite the stated "authorized testing" notice.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 1.00). The skill's runtime behavior clearly fetches and ingests responses from arbitrary target URLs (e.g., scripts/agent.py which sends requests to the user-supplied --url and captures resp.text/response data, and the SKILL.md/Turbo Intruder and curl examples that send requests to target endpoints), and those untrusted response bodies are analyzed to decide "potential_race" and remediation—allowing third-party content to materially influence the agent's decisions.
Issues (3)
W007
HIGHInsecure credential handling detected in skill instructions.
E006
CRITICALMalicious code pattern detected in skill scripts.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
Audit Metadata