Security of RC6
The best attack on RC6 appears to be exhaustive search for the user-supplied encryption key.
The data requirements to mount more sophisticated attacks on RC6 such as differential and linear cryptanalysis exceed the available data.
There are no know examples of what might be termed “weak” keys.