performing-phishing-simulation-with-gophish

Fail

Audited by Snyk on Apr 7, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). This content is a dual-use phishing simulation toolkit that explicitly automates creating campaigns, cloning landing pages, and capturing credentials via the GoPhish API (directly enabling credential theft and large-scale phishing operations), so it presents a high abuse risk even though there are no hidden backdoors, obfuscated payloads, or covert third-party exfiltration routines in the code.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill explicitly imports and clones arbitrary external webpages (untrusted third-party content) as part of its workflow—see SKILL.md Step 4 ("Clone legitimate login page using GoPhish's import feature") and the import_site(url) API call in scripts/process.py—which causes the agent to fetch and incorporate external HTML that can influence campaign creation and subsequent actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Issues (3)

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 7, 2026, 01:00 PM
Issues
3