penetration-testing
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The Python framework implemented in
SKILL.mdandreferences/automated-penetration-testing-framework.mdinvokes thetestssl.shsecurity tool viasubprocess.runto evaluate target SSL/TLS configurations. - [EXTERNAL_DOWNLOADS]: The implementation examples in the skill require standard libraries such as
requestsfor Python andaxiosfor Node.js to manage HTTP communications during security scans. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. 1. Ingestion points:
PenetrationTester.run_full_pentestandBurpSuiteAutomation.startScaningest content from target URLs and the Burp API. 2. Boundary markers: No delimiters or warnings are used when processing external responses. 3. Capability inventory: The skill usessubprocess.runand writes results to the local filesystem. 4. Sanitization: No sanitization or validation of ingested content is performed before storage or report generation. - [SAFE]: The skill contains various security testing payloads, including SQL injection strings and XSS scripts, as well as a list of common default credentials. These are functional components for the skill's primary purpose of vulnerability assessment.
Audit Metadata