Pentest Commands
Pass
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (LOW): The skill contains a vast library of command references for powerful system tools (Nmap, Hydra, Nikto). While these are high-risk commands, they are provided as templates for authorized security assessments and do not include automated execution logic.\n- [REMOTE_CODE_EXECUTION] (LOW): Includes documentation for generating reverse shells using
msfvenomand executing remote exploits viamsfconsole. This is classified as LOW severity because it is intended as a reference for penetration testers rather than an attempt to compromise the user's host.\n- [PROMPT_INJECTION] (LOW): Identified a surface for indirect prompt injection. The skill provides tools for scanning external, potentially attacker-controlled targets whose responses (e.g., HTTP headers, page content) are then processed by the agent. \n - Ingestion points: Target responses processed by Nikto, SQLMap, and Nmap NSE scripts (SKILL.md).\n
- Boundary markers: Absent; no instructions provided to the agent to ignore instructions embedded in tool outputs.\n
- Capability inventory: Extensive, including exploitation (Metasploit), credential cracking (Hydra/John), and packet manipulation (Aircrack-ng).\n
- Sanitization: Absent; the skill does not specify methods for filtering or escaping data returned from external probes.
Audit Metadata