skills/mukul975/anthropic-cybersecurity-skills/performing-binary-exploitation-analysis/Gen Agent Trust Hub
performing-binary-exploitation-analysis
Fail
Audited by Gen Agent Trust Hub on Apr 12, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill provides instructions to install the GDB Enhanced Features (GEF) plugin using the command
bash -c "$(curl -fsSL https://gef.blah.cat/sh)". Piping a remote script directly to a shell is a dangerous pattern that can lead to arbitrary code execution if the source is compromised. While GEF is a known tool, the domainblah.catis an external third-party source. - [EXTERNAL_DOWNLOADS]: The skill requires downloading and installing numerous external dependencies and tools, including
pwntools,ROPgadget, and thepwndbgplugin from GitHub (https://github.com/pwndbg/pwndbg). These tools are fetched from third-party repositories outside of the established trusted vendor list. - [COMMAND_EXECUTION]: The
scripts/agent.pyscript usessubprocess.runto executechecksecandROPgadgeton binary files provided by the user. This involves executing external binaries with parameters derived from user input. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8) because it processes untrusted binary files and displays metadata such as function names and symbol information. A specially crafted binary could contain malicious instructions embedded in its symbol table or section names that could influence the agent's behavior when it interprets the analysis report.
- Ingestion points:
scripts/agent.pyparses user-provided ELF binaries in theanalyze_binaryfunction. - Boundary markers: Absent. Extracted binary strings are included in the JSON report and console output without specific delimiters or instructions to ignore embedded content.
- Capability inventory: The agent has access to
subprocess.runacross several functions inscripts/agent.pyto execute system tools. - Sanitization: No sanitization of strings extracted from binary metadata is performed before they are incorporated into the output.
Recommendations
- HIGH: Downloads and executes remote code from: https://gef.blah.cat/sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata