inetutils-telnetd-exploit

Fail

Audited by Snyk on Apr 22, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This content is an explicit offensive exploit toolkit: it automates authentication bypass to obtain root shells, remote command execution (including examples to read /etc/shadow and spawn reverse shells), and includes scanning/exploitation scripts and templates—clearly designed for unauthorized system compromise and data exfiltration.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill actively connects to arbitrary remote Telnet servers (see the one-line telnet examples in SKILL.md and the Python scripts in references/cve-2026-24061-auth-bypass.md and references/cve-2026-32746-slc-overflow.md), parses banners and SLC/subnegotiation responses from those untrusted hosts, and uses those responses to decide and drive exploit actions, so third-party content can materially influence behavior.

Issues (2)

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 22, 2026, 10:08 AM
Issues
2