deserialization-testing
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The skill provides functional code snippets designed to achieve arbitrary code execution.
- Evidence: Python
pickleRCE using__reduce__to callos.system('id')and a complex reverse shell payload. - Evidence: PHP RCE examples using
system($this->cmd)in magic methods like__destructand POP chains usingcall_user_func. - [COMMAND_EXECUTION] (HIGH): Specific shell commands are provided for generating malicious payloads using external Java tools.
- Evidence: Instructions to execute
java -jar ysoserial.jar CommonsCollections1 "command" > payload.binand piped bash commands for base64-encoded reverse shells. - [DATA_EXFILTRATION] (MEDIUM): The skill includes payloads designed to establish outbound network connections to external entities.
- Evidence: Reverse shell payloads targeting
/dev/tcp/192.168.1.100/4444andattacker.com/4444. - [EXTERNAL_DOWNLOADS] (MEDIUM): The skill references and encourages the use of unverified external binary tools.
- Evidence: Mentions and provides command-line usage for
ysoserial.jarandphpggc, which are not hosted on trusted sources defined in the security policy.
Recommendations
- AI detected serious security threats
Audit Metadata