skills/mukul975/anthropic-cybersecurity-skills/deobfuscating-powershell-obfuscated-malware/Gen Agent Trust Hub
deobfuscating-powershell-obfuscated-malware
Fail
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
iex_replacement_deobfuscatefunction inSKILL.mdutilizessubprocess.runto execute PowerShell scripts generated from untrusted malware samples. This command includes the-ExecutionPolicy Bypassflag, which disables security restrictions on script execution. - [REMOTE_CODE_EXECUTION]: The skill performs dynamic execution of untrusted content by writing malware-derived scripts to temporary files and executing them via the PowerShell interpreter. Although the logic attempts to replace
Invoke-ExpressionwithWrite-Output, this sanitization is incomplete. PowerShell supports numerous other execution methods (e.g., call operator&, dot-sourcing.,Invoke-Command) that can trigger the execution of malicious payloads during the analysis process. - [PROMPT_INJECTION]: The skill is designed to process untrusted data from malware samples, creating a vulnerability where malicious instructions within the sample could influence the agent's analysis or behavior.
- Ingestion points: Malware scripts are ingested via command-line arguments in
scripts/agent.pyandscripts/process.py. - Boundary markers: Absent; the skill does not use delimiters or warnings to isolate untrusted content from its instructions.
- Capability inventory: The skill possesses capabilities for subprocess execution, file system interaction, and network indicator extraction.
- Sanitization: No validation or sanitization is applied to the malware content before it is processed or executed.
Recommendations
- AI detected serious security threats
Audit Metadata