skills/mukul975/anthropic-cybersecurity-skills/implementing-network-intrusion-prevention-with-suricata/Snyk
implementing-network-intrusion-prevention-with-suricata
Fail
Audited by Snyk on Apr 20, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The prompt includes an explicit example that passes a license/key value on the command line (e.g., sudo suricata-update enable-source et/pro secret-code=YOUR_OINKCODE), which requires embedding secret values verbatim in generated commands and thus poses exfiltration risk.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The SKILL.md "Step 4: Manage Rules with Suricata-Update" explicitly instructs enabling and pulling rule sources from public third-party repositories (e.g., ET Open, et/pro, ptresearch, sslbl) which Suricata ingests as rulesets that directly change blocking/alerting behavior, so untrusted external content can materially influence runtime actions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The skill instructs using suricata-update to fetch the ET Open ruleset (e.g., https://rules.emergingthreats.net/open/), which at runtime downloads rule content that directly controls Suricata's detection/blocking behavior and is treated as a required dependency.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs the user/agent to run sudo commands and to modify system files and network/firewall configuration (e.g., /etc/suricata/suricata.yaml, iptables, /etc/iptables/rules.v4, systemd service actions, /var/lib/suricata/rules), which require elevated privileges and change the machine's state and network behavior.
Issues (4)
W007
HIGHInsecure credential handling detected in skill instructions.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata