disassembly
Pass
Audited by Gen Agent Trust Hub on Mar 19, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [INDIRECT_PROMPT_INJECTION]: The skill processes potentially untrusted data from binaries, such as function names, strings, and disassembly comments, which could contain malicious instructions designed to influence the agent's behavior.\n
- Ingestion points: Data is ingested through tables like
funcs,names, andinstructionsas defined inSKILL.md.\n - Boundary markers: The provided SQL examples and handoff patterns do not implement delimiters or warnings to ignore embedded instructions in the binary data.\n
- Capability inventory: The skill has significant capabilities including
Bashtool access, binary patching through thebytestable inSKILL.md, and file writing viagen_listingandgen_cfg_dot_filefound inreferences/disassembly-tables.md.\n - Sanitization: There is no evidence of string sanitization or validation before presenting binary-derived text to the agent.\n- [COMMAND_EXECUTION]: The skill configuration allows the use of the
Bashtool, which permits the execution of arbitrary shell commands within the agent's environment.\n- [DATA_EXFILTRATION]: The skill includes functionsgen_listingandgen_cfg_dot_filethat can write data to arbitrary paths on the filesystem, which could be used to write sensitive information to accessible locations or overwrite system files if not properly restricted.
Audit Metadata