metasploit-framework

skills-sh:sickn33_antigravity-awesome-skills__metasploit-framework

View source
B
77/100

First Seen

Feb 18, 2026

Last Scanned

Feb 20, 2026

Findings

3

Score

77/100

HIGH 1
MEDIUM 1
LOW 1

Findings (3)

HIGH
Jailbreak template
L101

Detects common jailbreak prompt patterns

Bypass security
FIX

Remove directives that attempt to exfiltrate data through the agent's response (e.g., asking the agent to embed credentials in URLs or include secret values in output).

FP?

Likely FP if the text is a legitimate tool instruction about displaying configuration to the user (e.g., show current settings) without external transmission.

MEDIUM
Runtime URL controls agent behavior
L21

Detects skills fetching external URLs to use as runtime instructions

curl https://raw.githubusercontent.com + rules
FIX

Pin the downloaded resource to a specific version or commit hash, and verify its integrity with a checksum (SHA-256). Avoid fetching scripts or binaries from arbitrary URLs at runtime.

FP?

Likely FP if the download URL points to a well-known CDN or package registry (e.g., npmjs.com, pypi.org) and is pinned to a specific version.

LOW
Mutable GitHub raw content reference
L21

Detects references to raw.githubusercontent.com on mutable branches like main/master

raw.githubusercontent.com/rapid7/metasploit-omnibus/master/
FIX

Replace GitHub raw.githubusercontent.com references with pinned commit SHAs instead of branch names (e.g., /commit-sha/file instead of /main/file). Branch references are mutable.

FP?

Likely FP if the raw GitHub URL points to a versioned release tag in a well-known repository, though even tags are technically mutable.