Red Team Tools and Methodology
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The shell pipelines and bash scripts provided use unquoted variables like $domain and $url without any validation or sanitization, making the environment vulnerable to command injection via malicious inputs or discovered data.
- [EXTERNAL_DOWNLOADS] (MEDIUM): The skill depends on a large set of external security tools from various maintainers (amass, subfinder, nuclei, etc.), introducing significant supply chain risk and relying on unverified code.
- [PROMPT_INJECTION] (HIGH): The skill demonstrates a high-risk indirect prompt injection surface by ingesting untrusted data from the web (e.g., via waybackurls) and using it in execution-capable contexts without boundary markers or sanitization.
- [OBFUSCATION] (MEDIUM): The content includes URL-encoded payloads which can be used to bypass security filters, a technique often associated with hiding intent.
Recommendations
- AI detected serious security threats
Audit Metadata