inetutils-telnetd-exploit
Fail
Audited by Snyk on Apr 22, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This content is an explicit offensive exploit toolkit: it automates authentication bypass to obtain root shells, remote command execution (including examples to read /etc/shadow and spawn reverse shells), and includes scanning/exploitation scripts and templates—clearly designed for unauthorized system compromise and data exfiltration.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill actively connects to arbitrary remote Telnet servers (see the one-line telnet examples in SKILL.md and the Python scripts in references/cve-2026-24061-auth-bypass.md and references/cve-2026-32746-slc-overflow.md), parses banners and SLC/subnegotiation responses from those untrusted hosts, and uses those responses to decide and drive exploit actions, so third-party content can materially influence behavior.
Issues (2)
E006
CRITICALMalicious code pattern detected in skill scripts.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
Audit Metadata