skills/mukul975/anthropic-cybersecurity-skills/analyzing-packed-malware-with-upx-unpacker/Gen Agent Trust Hub
analyzing-packed-malware-with-upx-unpacker
Warn
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The provided analysis script uses unsafe shell execution patterns when calling the UPX utility.
- Evidence: In
scripts/agent.py, theunpack_upxfunction usessubprocess.run(cmd, shell=True)wherecmdis a formatted string containing thefilepathandoutput_path. These paths are derived fromsys.argv[1]without sanitization. - Impact: If a user or an automated process provides a filename containing shell metacharacters (e.g.,
; rm -rf /), it could lead to arbitrary command execution on the host analysis machine. - [PROMPT_INJECTION]: The skill is designed to ingest and analyze untrusted data (malware binaries), which introduces an indirect prompt injection surface.
- Ingestion points: The
scripts/agent.pyscript and the Python snippets inSKILL.mdingest raw binary data and PE header information from potentially malicious files. - Boundary markers: Absent. The skill does not provide instructions to the AI agent to use delimiters or to disregard natural language instructions that might be embedded in the malware's strings or metadata.
- Capability inventory: The skill utilizes subprocess execution (
upx), file reading (pefile,open), and file writing (open("wb")). - Sanitization: Absent. The scripts extract and display section names, import names, and entropy values directly from the binary without sanitizing the strings for potential escape sequences or malicious content.
- [EXTERNAL_DOWNLOADS]: The skill references external tools and software repositories for malware analysis.
- Evidence:
SKILL.mddirects users to download UPX fromupx.github.ioand install packages viaapt install upx-ucl. - Note: These references target well-known and official technology services and do not involve automated execution of untrusted remote code within the skill itself.
Audit Metadata