reverse-engineering-quick-triage
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The file
resources/scripts/radare2-triage.pycontains a vulnerability in thedisassemble_functionmethod (line 117). It uses an f-string to interpolate thefunc_namevariable directly into a radare2 command string:self.r2.cmd(f'pdf @ {func_name}'). Since radare2 commands can execute shell commands (e.g., via the!prefix), a maliciously crafted function name provided via the--functionsargument could lead to arbitrary OS command execution. This is downgraded from HIGH because it is a specialized tool intended for binary analysis.\n- [PROMPT_INJECTION] (LOW): The skill performs indirect prompt injection (Category 8) by design. Bothioc-extractor.jsandradare2-triage.pyingest untrusted data from binary files (IOCs, strings, and metadata) and output them into reports. If an AI agent later consumes these reports, instructions embedded within the binary could influence the agent's behavior. Evidence: Ingestion inioc-extractor.js(line 72) andradare2-triage.py(line 123); No boundary markers or sanitization are implemented for the extracted text content.\n- [EXTERNAL_DOWNLOADS] (LOW): The scripts reference several external dependencies includingyargs,chalk,axios,validator(Node.js) andr2pipe(Python). While these are standard libraries, they represent a dependency on external package registries for the skill to be fully functional.
Audit Metadata