conducting-spearphishing-simulation-campaign

Fail

Audited by Gen Agent Trust Hub on Apr 17, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
  • [REMOTE_CODE_EXECUTION]: File 'references/workflows.md' provides a functional implementation of HTML Smuggling, which uses Base64 encoding to deliver binary executables directly via the browser to bypass email security filters.
  • [REMOTE_CODE_EXECUTION]: The documentation in 'references/workflows.md' details workflows for creating macro-enabled documents and ISO/LNK chains that utilize PowerShell download cradles to execute remote payloads.
  • [CREDENTIALS_UNSAFE]: The script 'scripts/agent.py' disables SSL/TLS certificate verification ('verify=False') during requests to the GoPhish API, exposing sensitive API keys and campaign data to Man-in-the-Middle (MitM) attacks.
  • [COMMAND_EXECUTION]: 'references/workflows.md' includes shell commands for downloading, installing, and executing third-party binaries (GoPhish) and managing server certificates with root-level implications.
  • [EXTERNAL_DOWNLOADS]: The skill instructs users to fetch binary releases and tools from external repositories (e.g., GitHub) to establish the phishing infrastructure.
  • [DATA_EXFILTRATION]: The primary objective of the included scripts and workflows is to facilitate credential harvesting and the capture of sensitive user interaction data.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Apr 17, 2026, 10:04 AM