skills/mukul975/anthropic-cybersecurity-skills/building-red-team-c2-infrastructure-with-havoc/Gen Agent Trust Hub
building-red-team-c2-infrastructure-with-havoc
Warn
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
SKILL.mdfile contains setup instructions requiring the user to execute commands with administrative privileges usingsudo apt installto install build dependencies. - [CREDENTIALS_UNSAFE]: Hardcoded example passwords and credentials are present in the configuration snippets in
SKILL.md(Step 2) and theassets/template.mdfile. - [EXTERNAL_DOWNLOADS]: The skill downloads external source code and language dependencies from GitHub (
HavocFramework/Havoc) and the Go package registry as part of the build process. - [EXTERNAL_DOWNLOADS]: The Python scripts
scripts/agent.pyandscripts/process.pydisable SSL certificate and hostname verification (verify=FalseandCERT_NONE), which could allow man-in-the-middle attacks during infrastructure monitoring and management. - [PROMPT_INJECTION]: The
scripts/agent.pyscript processes data from a remote teamserver API, creating a surface for indirect prompt injection attacks if the API source is compromised. - Ingestion points: Data is fetched from the teamserver's
/api/listeners,/api/agents, and/api/payloads/generateendpoints inscripts/agent.py. - Boundary markers: No delimiters or safety instructions are used when processing or reporting the external data.
- Capability inventory: The script performs network requests and writes JSON reports to the local filesystem using data derived from the API.
- Sanitization: No validation or escaping is performed on the data retrieved from the remote API before processing.
- [PROMPT_INJECTION]: There is a metadata discrepancy between the author specified in
SKILL.md("mahipal") and the copyright holder listed in theLICENSEfile ("mukul975"), which may be misleading regarding the skill's origin.
Audit Metadata