file-upload-testing

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
  • [REMOTE_CODE_EXECUTION] (HIGH): The skill provides functional PHP payloads for arbitrary code execution, including <?php system($_GET['cmd']); ?> and <?php eval($_POST['a']); ?>. It also includes obfuscation techniques to bypass security filters.
  • [COMMAND_EXECUTION] (HIGH): A functional Python script is included that uses threading and requests to exploit race conditions, which could lead to unauthorized code execution on target systems.
  • [DATA_EXFILTRATION] (MEDIUM): The skill documents path traversal techniques used to target sensitive system files such as /etc/passwd and the Windows SAM database (windows/system32/config/sam).
  • [EXTERNAL_DOWNLOADS] (MEDIUM): The methodology references external tools and scripts (e.g., upload_bypass.py, png2php.py, and msfvenom) for generating and delivering malicious payloads.
  • [PROMPT_INJECTION] (LOW): While not a direct attack on the agent, the inclusion of %00 (Null Byte) patterns (e.g., shell.jpg%00.php) was flagged as a malicious URL pattern (00.ph) by automated scanners, which can confuse parsing and security logic.
Recommendations
  • AI detected serious security threats
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 05:02 AM