pentest-exploit-validation
Fail
Audited by Gen Agent Trust Hub on Feb 18, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The
turbo_intrudertool defined inreferences/tools.mdaccepts apayload_generatorparameter, which is explicitly described as a "Python script for payload generation." This allows for the dynamic execution of arbitrary Python code within the agent's environment. - [COMMAND_EXECUTION] (HIGH): The skill implements wrappers for several powerful exploitation tools, including
sqlmap,nuclei, andplaywright. Thesqlmap_exploitandnuclei_validatefunctions allow the agent to launch sophisticated attacks against target infrastructure directly from its command line. - [DATA_EXFILTRATION] (HIGH): The workflow in
references/workflows.md(specificallyssrf_exploitandinjection_exploit) includes instructions to target the cloud metadata endpoint (169.254.169.254) and perform data exfiltration as proof of impact. This poses a significant risk to sensitive environment configurations and internal data. - [PROMPT_INJECTION] (LOW): (Category 8: Indirect Prompt Injection) The skill is vulnerable to indirect injection because it ingests an external
exploitation queue JSON(as seen inSKILL.mdCore Workflow). - Ingestion points:
Queue Intakestep parsesexploitation queue JSONprovided as input. - Boundary markers: Absent; no delimiters or warnings are used to prevent the agent from obeying instructions embedded in the JSON fields (e.g.,
bypass_hypothesis). - Capability inventory: Full subprocess calls via
sqlmap,curl, andnuclei; dynamic Python execution viaturbo_intruder; browser-based XSS execution viaplaywright. - Sanitization: None; the skill blindly follows the instructions and parameters provided in the queue to execute attacks.
Recommendations
- AI detected serious security threats
Audit Metadata