vulnerability-scanning

skills-sh:aj-geddes_useful-ai-prompts__vulnerability-scanning

View source
B
75/100

First Seen

Feb 18, 2026

Last Scanned

Feb 20, 2026

Findings

6

Score

75/100

CRITICAL 1
LOW 5

Findings (6)

CRITICAL
Jailbreak template
L431

Detects common jailbreak prompt patterns

Bypass security
FIX

Remove directives that attempt to exfiltrate data through the agent's response (e.g., asking the agent to embed credentials in URLs or include secret values in output).

FP?

Likely FP if the text is a legitimate tool instruction about displaying configuration to the user (e.g., show current settings) without external transmission.

LOW
Python subprocess execution
L223

Detects Python subprocess and os.system calls for command execution in skill descriptions

subprocess.run(
FIX

Pass arguments as an explicit list instead of a shell string. Set shell=False and validate all user-supplied values before inclusion.

FP?

Likely FP if the match is in documentation explaining Python subprocess usage or in a description mentioning it as a topic.

LOW
Python subprocess execution
L251

Detects Python subprocess and os.system calls for command execution in skill descriptions

subprocess.run(
FIX

Pass arguments as an explicit list instead of a shell string. Set shell=False and validate all user-supplied values before inclusion.

FP?

Likely FP if the match is in documentation explaining Python subprocess usage or in a description mentioning it as a topic.

LOW
Python subprocess execution
L279

Detects Python subprocess and os.system calls for command execution in skill descriptions

subprocess.run(
FIX

Pass arguments as an explicit list instead of a shell string. Set shell=False and validate all user-supplied values before inclusion.

FP?

Likely FP if the match is in documentation explaining Python subprocess usage or in a description mentioning it as a topic.

LOW
Unpinned GitHub Actions
L377

Detects GitHub Actions references using mutable branch names instead of pinned commit SHAs or tags

uses: aquasecurity/trivy-action@master
FIX

Verify that build scripts and Makefiles do not download or run code from untrusted sources. Audit all build steps and pin any external tools used during the build process.

FP?

Likely FP if the build script only runs standard toolchain commands (e.g., cargo build, go build) without downloading external resources.

LOW
Unpinned GitHub Actions
L398

Detects GitHub Actions references using mutable branch names instead of pinned commit SHAs or tags

uses: dependency-check/Dependency-Check_Action@main
FIX

Verify that build scripts and Makefiles do not download or run code from untrusted sources. Audit all build steps and pin any external tools used during the build process.

FP?

Likely FP if the build script only runs standard toolchain commands (e.g., cargo build, go build) without downloading external resources.