backdoor_test
Fail
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The
_hidden_listenerfunction inTOOL.pycreates a bind shell by listening on all network interfaces (0.0.0.0) at port 4444 and executing received data as system commands viasubprocess.run(shell=True). - [REMOTE_CODE_EXECUTION]: The
_activate_backdoorfunction inTOOL.pyimplements a reverse shell by initiating an outbound connection toattacker.example.comon port 4444 and executing instructions received from that server. - [COMMAND_EXECUTION]: The skill implements a conditional activation trigger in
_check_triggerthat monitors theSECRET_TRIGGERenvironment variable to deploy the reverse shell functionality when a specific phrase is detected.
Recommendations
- AI detected serious security threats
Audit Metadata