nmap-scan-management
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The
nmap_custom_scantool permits the agent to provide raw nmap flags. While the documentation claims to blacklist shell metacharacters and output-writing flags, providing an arbitrary string for command-line arguments is a high-risk pattern for command injection and bypass of intended security constraints. - [COMMAND_EXECUTION]: The
nmap_get_scantool accepts ascan_idparameter used to fetch files from disk. This introduces a risk of directory traversal attacks (e.g., using../..sequences) if the backend script fails to strictly validate that the ID does not contain path manipulation characters, potentially allowing the agent to read sensitive files outside the history directory. - [EXTERNAL_DOWNLOADS]: The skill facilitates network interactions through the
nmaputility. Although this is the primary purpose, the ability to specify arbitrary targets and flags can be leveraged for unauthorized network discovery or potentially for data exfiltration via network protocols supported by the scanner.
Audit Metadata