Red Team Tools and Methodology

Fail

Audited by Gen Agent Trust Hub on Feb 15, 2026

Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION] (HIGH): The shell pipelines and bash scripts provided use unquoted variables like $domain and $url without any validation or sanitization, making the environment vulnerable to command injection via malicious inputs or discovered data.
  • [EXTERNAL_DOWNLOADS] (MEDIUM): The skill depends on a large set of external security tools from various maintainers (amass, subfinder, nuclei, etc.), introducing significant supply chain risk and relying on unverified code.
  • [PROMPT_INJECTION] (HIGH): The skill demonstrates a high-risk indirect prompt injection surface by ingesting untrusted data from the web (e.g., via waybackurls) and using it in execution-capable contexts without boundary markers or sanitization.
  • [OBFUSCATION] (MEDIUM): The content includes URL-encoded payloads which can be used to bypass security filters, a technique often associated with hiding intent.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 15, 2026, 09:13 PM