python-security-tools
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [Data Exposure & Exfiltration] (MEDIUM): The skill includes code templates that explicitly disable SSL certificate verification (s.verify = False). This practice facilitates sensitive data exposure and makes communications vulnerable to man-in-the-middle attacks.
- [Unverifiable Dependencies & Remote Code Execution] (MEDIUM): The skill relies on external, high-capability libraries such as scapy and pwntools. While standard for security research, these tools provide the building blocks for arbitrary network manipulation and binary exploitation, which are high-risk capabilities.
- [Indirect Prompt Injection] (MEDIUM): The skill has a significant attack surface for indirect prompt injection due to its handling of external data. 1. Ingestion points: Untrusted data enters via requests.get, socket.recv, and scapy packet sniffing. 2. Boundary markers: None provided in the templates. 3. Capability inventory: Significant network and system capabilities via requests, scapy, and pwntools. 4. Sanitization: No validation or sanitization logic is present for retrieved content.
- [Metadata Poisoning] (INFO): The automated scanner alert for 'socket.AF' is a false positive result caused by a regex match on the standard Python socket constant socket.AF_INET.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata