skills/mukul975/anthropic-cybersecurity-skills/conducting-social-engineering-penetration-test/Gen Agent Trust Hub
conducting-social-engineering-penetration-test
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill references and provides instructions for downloading multiple external security tools, including GoPhish, Evilginx2, the Social Engineer Toolkit (SET), and theHarvester. References point to well-known domains such as github.com and getgophish.com.
- [COMMAND_EXECUTION]: SKILL.md contains numerous shell command examples for reconnaissance (theHarvester, dig), tool installation (apt install gophish), and framework configuration (evilginx2 setup).
- [DATA_EXFILTRATION]: The management scripts (
scripts/agent.pyandscripts/process.py) utilize therequestslibrary to communicate with a remote GoPhish API. These scripts explicitly disable SSL/TLS certificate verification usingverify=Falseandurllib3.disable_warnings(), which increases the risk of man-in-the-middle attacks. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8).
- Ingestion points:
scripts/agent.pyandscripts/process.pyfetch campaign data, results, and target information from the external GoPhish API via the_getandget_campaign_resultsmethods. - Boundary markers: No boundary markers or instructions to ignore embedded content are present in the processing logic.
- Capability inventory: The scripts possess network request capabilities (
requests.get/post) and file system write access (open().write()). - Sanitization: The skill lacks sanitization, escaping, or validation of the data retrieved from the API before it is printed to the console or written to markdown reports.
Audit Metadata