web-exploits
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- REMOTE_CODE_EXECUTION (CRITICAL): The file
webshells/node_cmd.jsis a functional backdoor. It listens for HTTP requests and executes arbitrary system commands provided via thecmdquery parameter or POST body using thechild_process.execfunction without any sanitization. - COMMAND_EXECUTION (HIGH): Several scripts, including
ssti_tester.pyandupload_tester.py, are designed to automate the delivery of RCE payloads. For example,ssti_tester.pyexplicitly tests for Jinja2 exploitation usingos.popenorPopenpatterns to execute shell commands. - DATA_EXFILTRATION (HIGH): The toolkit includes numerous payloads in
payloads/lfi.txt,payloads/sqli_mysql.txt, andpayloads/ssrf.txtthat target sensitive information such as/etc/shadow,/etc/passwd, and AWS/GCP metadata service credentials.lfi_tester.pyautomates the process of reading these sensitive files from remote servers. - COMMAND_EXECUTION (MEDIUM):
payloads/cmd_injection.txtprovides a comprehensive list of shell command injection techniques, including reverse shell strings (bash -i >& /dev/tcp/...) and data exfiltration viacurlandwget.
Recommendations
- AI detected serious security threats
Audit Metadata