shellter
Fail
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides specific command-line examples for running
shellter.exe(directly or via Wine) to automate the process of backdooring legitimate executables likeputty.exe. - [REMOTE_CODE_EXECUTION]: The skill facilitates the creation of malicious binaries by providing examples for injecting Metasploit payloads such as
windows/meterpreter/reverse_tcp, which are designed to establish remote unauthorized control over a system. - [REMOTE_CODE_EXECUTION]: The documentation explicitly describes the process of "trojanizing" software to evade antivirus (AV) detection for "initial access," which is a high-risk activity involving the preparation of remote exploitation tools.
Recommendations
- AI detected serious security threats
Audit Metadata