performing-red-team-phishing-with-gophish

Fail

Audited by Snyk on Apr 7, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt explicitly shows embedding API keys in command-line arguments and code (e.g., --api-key and api = Gophish("api_key", ...)), which requires the agent to include secret values verbatim in generated commands/code, creating exfiltration risk.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This code is explicitly an automation tool for phishing campaigns: it creates landing pages with capture_credentials=True, configures SMTP sending profiles, imports target lists, launches campaigns, and collects campaign results (including submitted credentials) — functionality that directly enables credential theft and mass phishing; there are no signs of hidden backdoors, obfuscated payloads, remote code execution primitives, or covert exfiltration to unknown endpoints, but the intended abuse (phishing/credential harvesting/sending unsolicited emails) is clear.

Issues (2)

W007
HIGH

Insecure credential handling detected in skill instructions.

E006
CRITICAL

Malicious code pattern detected in skill scripts.

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 7, 2026, 01:00 PM
Issues
2