nxc-cme

Fail

Audited by Snyk on Apr 22, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill repeatedly shows and instructs embedding plaintext credentials into command-line invocations (e.g., -p 'password', NTLM_HASH), meaning the agent would need to include secret values verbatim in generated commands — a high exfiltration risk.

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.80). Both URLs point to GitHub repositories that host dual-use offensive tools (NetExec / CrackMapExec) which, while hosted on a legitimate platform, provide capabilities for credential dumping, lateral movement and remote code execution—making downloads/execution from them high-risk if sourced from untrusted forks or used maliciously.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This content explicitly documents and instructs on offensive Windows/Active Directory operations (password spraying, credential validation, remote command execution, SAM/LSA/NTDS exports, Mimikatz usage, Kerberoast/AS-REP attacks, SMB share spidering) and therefore intentionally facilitates credential theft, lateral movement, privilege escalation, and data exfiltration.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). Flagged because the SKILL.md explicitly instructs executing commands that read arbitrary remote/third-party host content (e.g., "nxc smb TARGET -x 'type C:\flag.txt'" in the "远程命令执行" section and the spider_plus/shared-search modules in "模块系统"), so untrusted file/share outputs would be ingested and could materially influence subsequent actions.

Issues (4)

W007
HIGH

Insecure credential handling detected in skill instructions.

E005
CRITICAL

Suspicious download URL detected in skill instructions.

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 22, 2026, 10:09 AM
Issues
4