conducting-mobile-application-penetration-test

Pass

Audited by Gen Agent Trust Hub on Mar 15, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
  • [COMMAND_EXECUTION]: The scripts/agent.py script utilizes the subprocess module to run external CLI tools, specifically apktool for decompilation and objection for runtime security checks. These operations are legitimate and necessary for the skill's purpose as an automated security testing tool.- [EXTERNAL_DOWNLOADS]: The skill references and provides installation guidance for several industry-standard security tools, including Frida, Objection, and MobSF. All linked sources and documentation sites (such as GitHub repositories for SensePost and MobSF, and the official Frida website) are well-known and reputable services in the technology community.- [DATA_EXFILTRATION]: The skill provides procedures for accessing and inspecting potentially sensitive data on target mobile devices, such as keystores, local databases, and application logs. These activities are localized to the testing environment and are standard procedures for identifying insecure data storage vulnerabilities during a penetration test.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 15, 2026, 09:04 AM