Recon
Warn
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes
sudowithinTools/MassScan.tsto run themasscanutility. This is necessary for raw packet operations but enables the skill to execute commands with root privileges.\n- [EXTERNAL_DOWNLOADS]: TheWorkflows/UpdateTools.mdworkflow provides instructions for updating security tools using thepdtmutility, which downloads and installs binaries from ProjectDiscovery's official repositories.\n- [PROMPT_INJECTION]: TheWorkflows/AnalyzeScanResultsGemini3.mdworkflow is vulnerable to indirect prompt injection. It takes raw output from network scans (e.g., nmap or masscan), which may contain attacker-controlled strings such as service banners or hostnames, and includes them directly in a prompt for AI analysis.\n - Ingestion points: Scan results from files are read in
Workflows/AnalyzeScanResultsGemini3.md.\n - Boundary markers: The prompt uses markdown code blocks for scan results but lacks explicit instructions for the AI to disregard any commands or directions embedded within that untrusted data.\n
- Capability inventory: The skill possesses extensive network communication and shell command execution capabilities through its integrated toolset.\n
- Sanitization: No filtering, escaping, or sanitization is performed on the raw scan data before it is sent to the LLM.
Audit Metadata