skills/mukul975/anthropic-cybersecurity-skills/conducting-spearphishing-simulation-campaign/Gen Agent Trust Hub
conducting-spearphishing-simulation-campaign
Fail
Audited by Gen Agent Trust Hub on Apr 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [REMOTE_CODE_EXECUTION]: File 'references/workflows.md' provides a functional implementation of HTML Smuggling, which uses Base64 encoding to deliver binary executables directly via the browser to bypass email security filters.
- [REMOTE_CODE_EXECUTION]: The documentation in 'references/workflows.md' details workflows for creating macro-enabled documents and ISO/LNK chains that utilize PowerShell download cradles to execute remote payloads.
- [CREDENTIALS_UNSAFE]: The script 'scripts/agent.py' disables SSL/TLS certificate verification ('verify=False') during requests to the GoPhish API, exposing sensitive API keys and campaign data to Man-in-the-Middle (MitM) attacks.
- [COMMAND_EXECUTION]: 'references/workflows.md' includes shell commands for downloading, installing, and executing third-party binaries (GoPhish) and managing server certificates with root-level implications.
- [EXTERNAL_DOWNLOADS]: The skill instructs users to fetch binary releases and tools from external repositories (e.g., GitHub) to establish the phishing infrastructure.
- [DATA_EXFILTRATION]: The primary objective of the included scripts and workflows is to facilitate credential harvesting and the capture of sensitive user interaction data.
Recommendations
- AI detected serious security threats
Audit Metadata