skills/mukul975/anthropic-cybersecurity-skills/exploiting-oauth-misconfiguration/Gen Agent Trust Hub
exploiting-oauth-misconfiguration
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides bash loops and a Python agent that execute
curlandpython3commands to test OAuth authorization and token endpoints. - [EXTERNAL_DOWNLOADS]: The
scripts/agent.pytool performs network requests to fetch OIDC discovery documents and test responses from external authorization servers. - [DATA_EXFILTRATION]: The skill is designed to send test parameters, such as Client IDs and redirect URIs, to external servers to evaluate their security posture during vulnerability research.
- [PROMPT_INJECTION]: The skill has an indirect prompt injection surface because it processes untrusted data from OIDC discovery endpoints.
- Ingestion points:
scripts/agent.pyreads JSON from user-provided URLs indiscover_oidc_config. - Boundary markers: The script does not use specific delimiters or instructions to ignore potential commands within the OIDC JSON.
- Capability inventory: The tool performs network calls and parameter fuzzing based on data retrieved from external configurations in
test_redirect_uri_bypassesand others. - Sanitization: The script uses standard JSON parsing but lacks explicit schema validation or filtering for the ingested configuration data.
Audit Metadata