shellcode-loader-generate
Fail
Audited by Snyk on Apr 22, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This skill is explicitly malicious: it is a toolkit to generate Windows shellcode loaders (embedding/encrypted/remote storage, RWX allocation, copying, many execution/injection primitives including CreateRemoteThread/SetThreadContext/APC/Fiber/NtCreateThreadEx, direct syscalls, and evasion techniques like API hashing, ETW bypass, sandbox checks and encrypted payloads) clearly intended to enable remote code execution, stealthy compromise, and persistence/evasion.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). This skill explicitly guides generation and compilation of shellcode loaders (memory allocators, code injectors, execution techniques) and references sandbox evasion, which enable executing or injecting arbitrary code and therefore can compromise the host machine.
Issues (2)
E006
CRITICALMalicious code pattern detected in skill scripts.
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata