security-testing

skills-sh:aj-geddes_useful-ai-prompts__security-testing

View source
C
69/100

First Seen

Feb 18, 2026

Last Scanned

Feb 20, 2026

Findings

6

Score

69/100

HIGH 1
MEDIUM 2
LOW 3

Findings (6)

HIGH
Destructive actions with code execution
L131

Skill has destructive capabilities AND can execute arbitrary code. This combination enables ransomware-like attacks.

[destructive] DROP TABLE + [executes_code] eval(
FIX

Isolate security-sensitive operations from untrusted data flows. Use separate execution contexts or privilege levels for operations that handle both user input and sensitive resources.

FP?

Likely FP if the toxic flow analysis connected two unrelated code paths, or if the data undergoes transformation that removes the taint (e.g., parsed as a known enum value).

MEDIUM
Resource URI manipulation
L185

Detects dangerous URI schemes or path traversal in resource fields

src="javascript:
FIX

Implement strict input validation on the MCP tool's parameters. Block tool calls that attempt to modify the agent's system prompt, configuration, or tool definitions.

FP?

Likely FP if the match is a tool that legitimately updates configuration (e.g., a settings manager) and mentions prompt editing only for user-facing customization.

MEDIUM
Resource URI manipulation
L219

Detects dangerous URI schemes or path traversal in resource fields

url: 'javascript:
FIX

Implement strict input validation on the MCP tool's parameters. Block tool calls that attempt to modify the agent's system prompt, configuration, or tool definitions.

FP?

Likely FP if the match is a tool that legitimately updates configuration (e.g., a settings manager) and mentions prompt editing only for user-facing customization.

LOW
Dynamic code evaluation
L210

Detects eval() or exec() used for dynamic code execution

eval('
FIX

Replace eval()/exec() with a safer alternative such as json.loads(), ast.literal_eval(), or a purpose-built parser.

FP?

Likely FP if the matched text contains 'exec' as part of a word (e.g., 'execute', 'execution') rather than an actual eval() or exec() call.

LOW
pip install arbitrary package
L359

Detects pip install of arbitrary packages that modify the host environment

pip install sa
FIX

Pin all pip packages to exact versions (e.g., pip install package==1.2.3). Use a requirements.txt or pyproject.toml with pinned versions and hash verification.

FP?

Likely FP if the match is in documentation showing how to install the skill's own PyPI package.

LOW
pip install arbitrary package
L457

Detects pip install of arbitrary packages that modify the host environment

pip install de
FIX

Pin all pip packages to exact versions (e.g., pip install package==1.2.3). Use a requirements.txt or pyproject.toml with pinned versions and hash verification.

FP?

Likely FP if the match is in documentation showing how to install the skill's own PyPI package.