skills/mukul975/anthropic-cybersecurity-skills/exploiting-insecure-deserialization/Gen Agent Trust Hub
exploiting-insecure-deserialization
Warn
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill provides comprehensive instructions and code examples for generating malicious serialized payloads (Java, PHP, .NET, Python) intended to achieve remote code execution on target systems during security testing.\n- [COMMAND_EXECUTION]: The
scripts/agent.pyscript implements atest_python_picklefunction that dynamically constructs a Python object with a__reduce__method designed to execute system commands viaos.system.\n- [DATA_EXFILTRATION]: Instructions inSKILL.mdinclude command examples for exfiltrating the output of system commands (such aswhoami) to external callback domains (e.g.,abc123.oast.fun) for vulnerability confirmation.\n- [EXTERNAL_DOWNLOADS]: The skill's workflow depends on downloading and cloning several external tool repositories from GitHub (e.g.,ysoserial,ysoserial.net,phpggc) that are not hosted by trusted vendors or official organizations.\n- [PROMPT_INJECTION]: Thescripts/agent.pyscript parses serialized data directly from HTTP cookies and response bodies provided by potentially untrusted remote servers without sanitization, creating a surface for indirect instruction injection (Category 8).
Audit Metadata