ctf-osint
Fail
Audited by Gen Agent Trust Hub on Apr 17, 2026
Risk Level: CRITICALEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill requires installing third-party packages such as
shodanandPillow, and system tools likenmapandexiftool. It also interacts with various external OSINT APIs includingip-api.comandwhatsmyname.app. - [EXTERNAL_DOWNLOADS]: A reference to a malicious URL (
http://x.x.x.x:5000), flagged as botnet-related by automated scanners, is included as an example inweb-and-dns.md. - [COMMAND_EXECUTION]: The skill relies on shell command execution for its core functionality, which presents a risk if the agent is induced to execute malicious payloads through manipulated external data.
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to its processing of untrusted data (e.g., DNS TXT records, social media content, and web archives) without explicit sanitization or boundary markers. Ingestion points include the
whatsmyname.appAPI,ip-api.comresponses, and various web contents retrieved viaWebFetch. Capability inventory includesBash,Write,Edit, andTasktools. No sanitization or boundary markers were identified to protect against malicious instructions embedded in the retrieved OSINT data.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata