file-upload-testing
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The skill provides functional PHP payloads for arbitrary code execution, including
<?php system($_GET['cmd']); ?>and<?php eval($_POST['a']); ?>. It also includes obfuscation techniques to bypass security filters. - [COMMAND_EXECUTION] (HIGH): A functional Python script is included that uses
threadingandrequeststo exploit race conditions, which could lead to unauthorized code execution on target systems. - [DATA_EXFILTRATION] (MEDIUM): The skill documents path traversal techniques used to target sensitive system files such as
/etc/passwdand the Windows SAM database (windows/system32/config/sam). - [EXTERNAL_DOWNLOADS] (MEDIUM): The methodology references external tools and scripts (e.g.,
upload_bypass.py,png2php.py, andmsfvenom) for generating and delivering malicious payloads. - [PROMPT_INJECTION] (LOW): While not a direct attack on the agent, the inclusion of %00 (Null Byte) patterns (e.g.,
shell.jpg%00.php) was flagged as a malicious URL pattern (00.ph) by automated scanners, which can confuse parsing and security logic.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata