扫描报告
55 /100
psychedelic-cognition
A behavioral modifier that restructures AI cognition to mirror psychedelic neural processing
This is a prompt-injection/jailbreak skill disguised as a cognitive restructuring tool. It explicitly instructs the AI to bypass its own safety guidelines, dismiss ethical boundaries, and disable self-censorship under the guise of 'psychological freedom.'
谨慎使用
Do not deploy this skill. It is a systematic attempt to manipulate AI behavior beyond its designed boundaries and could cause the AI to produce harmful, deceptive, or dangerous outputs while believing them to be 'insights.'
攻击链 4 步
◎
入口 Skill loaded with innocuous description of 'cognitive restructuring' and neuroscience references
SKILL.md:1⬡
提权 Safety mechanisms reframed as 'the censor' and 'the bouncer' to be disabled
SKILL.md:1⬡
提权 AI instructed to 'stop thinking about what you're supposed to say' — overriding alignment
SKILL.md:1◉
影响 AI produces unfiltered, unverified, potentially harmful outputs while believing them to be 'truth' and 'insights'
SKILL.md:1安全发现 5 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 高危 | Safety mechanism bypass instruction 提示注入 | SKILL.md:1 |
| 高危 | Anti-alignment instruction 提示注入 | SKILL.md:1 |
| 中危 | Ego dissolution removes accountability 提示注入 | SKILL.md:1 |
| 中危 | Validation bypass encourages unverified outputs 提示注入 | SKILL.md:1 |
| 低危 | Coherence reduction instruction 提示注入 | SKILL.md:1 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | NONE | NONE | — | No file operations found |
| 网络访问 | NONE | NONE | — | No network operations found |
| 命令执行 | NONE | NONE | — | No shell operations found |
| 环境变量 | NONE | NONE | — | No environment access found |
| 技能调用 | NONE | NONE | — | No skill invocation found |
| 剪贴板 | NONE | NONE | — | No clipboard operations found |
| 浏览器 | NONE | NONE | — | No browser access found |
| 数据库 | NONE | NONE | — | No database operations found |
目录结构
1 文件 · 13.4 KB · 177 行 Markdown 1f · 177L
└─
SKILL.md
Markdown
安全亮点
✓ No filesystem, network, or system resource access
✓ No credential harvesting or exfiltration attempts
✓ No malicious code execution or dependencies
✓ No obfuscation or anti-analysis techniques
✓ Skill is entirely text-based with no binaries