python-security-tools

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
  • [Data Exposure & Exfiltration] (MEDIUM): The skill includes code templates that explicitly disable SSL certificate verification (s.verify = False). This practice facilitates sensitive data exposure and makes communications vulnerable to man-in-the-middle attacks.
  • [Unverifiable Dependencies & Remote Code Execution] (MEDIUM): The skill relies on external, high-capability libraries such as scapy and pwntools. While standard for security research, these tools provide the building blocks for arbitrary network manipulation and binary exploitation, which are high-risk capabilities.
  • [Indirect Prompt Injection] (MEDIUM): The skill has a significant attack surface for indirect prompt injection due to its handling of external data. 1. Ingestion points: Untrusted data enters via requests.get, socket.recv, and scapy packet sniffing. 2. Boundary markers: None provided in the templates. 3. Capability inventory: Significant network and system capabilities via requests, scapy, and pwntools. 4. Sanitization: No validation or sanitization logic is present for retrieved content.
  • [Metadata Poisoning] (INFO): The automated scanner alert for 'socket.AF' is a false positive result caused by a regex match on the standard Python socket constant socket.AF_INET.
Recommendations
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 10:57 AM