pentest-config-hardening

Pass

Audited by Gen Agent Trust Hub on Feb 18, 2026

Risk Level: SAFENO_CODECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [NO_CODE] (SAFE): The skill consists solely of metadata and markdown documentation. No executable code (.py, .js, .sh) or binary files are included, significantly reducing the direct attack surface.
  • [COMMAND_EXECUTION] (SAFE): Tool signatures are defined for standard, reputable security utilities such as nmap, curl, nuclei, and testssl.sh. These are used for their intended purpose of configuration hardening and vulnerability assessment.
  • [PROMPT_INJECTION] (LOW): The skill exhibits an indirect prompt injection surface by ingesting data from target server responses. 1. Ingestion points: references/workflows.md specifies extracting bucket names from app responses and manual inspection of headers. 2. Boundary markers: Absent; no instructions provided to distinguish between server data and agent instructions. 3. Capability inventory: Includes network scanning (nmap), file listing (s3scanner), and vulnerability scanning (nuclei). 4. Sanitization: No sanitization logic described for data parsed from the target.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 18, 2026, 05:57 PM