Security Scanning Tools
Warn
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill makes extensive use of high-privilege commands using
sudofor tasks such as starting services (sudo systemctl start nessusd), wireless interface manipulation (sudo airmon-ng start wlan0), and system auditing (sudo lynis audit system). While these are standard operations for the security tools described, they represent a significant attack surface if the agent is directed to use them maliciously. - [EXTERNAL_DOWNLOADS]: The skill instructions include installing multiple third-party packages without version pinning (
pip install prowler,pip install scoutsuite,sudo apt install openvas). Additionally, theinstall_commandin the metadata fetches the skill's instruction file from a GitHub repository belonging to an untrusted user (majiayu000). - [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection (Category 8). It is designed to ingest and process data from external, untrusted sources—such as network service banners via
nmap, web application content viaburpandzap, and wireless frame data viakismet. The skill lacks explicit boundary markers or instructions to sanitize or ignore malicious payloads embedded within this external data. - Ingestion points: Network scan results (
nmap), web crawl data (Burp Suite,OWASP ZAP), and vulnerability reports (Nessus,OpenVAS) described inSKILL.md. - Boundary markers: No delimiters or warnings to ignore instructions within processed data are present in the core workflow.
- Capability inventory: The skill utilizes numerous powerful CLI tools (
msfconsole,nmap,masscan,zap-cli,nessuscli) with the capability to perform network operations, file removal (clamscan --remove), and system modifications. - Sanitization: No sanitization or validation of the input data from external scans is described.
Audit Metadata