skills/mukul975/anthropic-cybersecurity-skills/conducting-full-scope-red-team-engagement/Gen Agent Trust Hub
conducting-full-scope-red-team-engagement
Warn
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructions in
SKILL.mdprovide detailed examples of shell and PowerShell commands for performing offensive security operations. These include reconnaissance tools such asamassandnmap, as well as high-risk credential harvesting and lateral movement tools likeSafetyKatz,Rubeus,secretsdump.py, andpsexec.py. - [EXTERNAL_DOWNLOADS]: The skill documentation references several external offensive security frameworks including Cobalt Strike, Sliver, Havoc C2, and GoPhish. It also requires the installation of the
impacketandattackctiPython libraries, which are utilized for advanced penetration testing and red teaming activities. - [DATA_EXFILTRATION]: Instructions within the skill explicitly describe methods for simulating data exfiltration. Examples provided include using
dnscat2for exfiltrating data over DNS and general techniques for moving data through Command and Control (C2) channels. - [PROMPT_INJECTION]: The skill processes external data which creates an attack surface for indirect prompt injection. 1. Ingestion points: The
scopeandobjectivesarguments inscripts/agent.py. 2. Boundary markers: No delimiters or warnings are used to separate user input from the rest of the generated plan. 3. Capability inventory: The agent is instructed on how to use invasive tools includingsecretsdump.py,psexec.py, anddnscat2across all engagement phases. 4. Sanitization: Theagent.pyscript performs no validation or escaping of the input data before including it in the output.
Audit Metadata