ofbiz-exploit

Fail

Audited by Snyk on Apr 22, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This content is an explicit exploit toolkit: it provides step‑by‑step exploitation chains (auth bypass, XML‑RPC deserialization, Groovy expression/path traversal RCE), scripts to execute arbitrary commands and establish reverse shells, and uses obfuscation (base64/Unicode) and remote payload loading—clear deliberate malicious intent and backdoor/remote‑access behavior.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill's provided exploitation scripts and workflow (e.g., check_ofbiz, exploit_cve_2024_38856, and other functions in references/groovy-rce-exploits.md and references/auth-bypass-and-xmlrpc.md) perform HTTP requests to arbitrary target URLs and parse/interpret the returned response text to choose follow-up exploit actions, which clearly ingests untrusted third-party content that can influence behavior.

Issues (2)

E006
CRITICAL

Malicious code pattern detected in skill scripts.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 22, 2026, 10:09 AM
Issues
2