skills/jpropato/siba/Pentest Commands/Gen Agent Trust Hub

Pentest Commands

Pass

Audited by Gen Agent Trust Hub on Feb 19, 2026

Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION] (LOW): The skill contains a vast library of command references for powerful system tools (Nmap, Hydra, Nikto). While these are high-risk commands, they are provided as templates for authorized security assessments and do not include automated execution logic.\n- [REMOTE_CODE_EXECUTION] (LOW): Includes documentation for generating reverse shells using msfvenom and executing remote exploits via msfconsole. This is classified as LOW severity because it is intended as a reference for penetration testers rather than an attempt to compromise the user's host.\n- [PROMPT_INJECTION] (LOW): Identified a surface for indirect prompt injection. The skill provides tools for scanning external, potentially attacker-controlled targets whose responses (e.g., HTTP headers, page content) are then processed by the agent. \n
  • Ingestion points: Target responses processed by Nikto, SQLMap, and Nmap NSE scripts (SKILL.md).\n
  • Boundary markers: Absent; no instructions provided to the agent to ignore instructions embedded in tool outputs.\n
  • Capability inventory: Extensive, including exploitation (Metasploit), credential cracking (Hydra/John), and packet manipulation (Aircrack-ng).\n
  • Sanitization: Absent; the skill does not specify methods for filtering or escaping data returned from external probes.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 19, 2026, 06:40 PM