skills/mukul975/anthropic-cybersecurity-skills/performing-external-network-penetration-test/Gen Agent Trust Hub
performing-external-network-penetration-test
Pass
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The automation scripts
scripts/agent.pyandscripts/process.pyexecute external command-line tools such asnmap,subfinder, andnucleiusing thesubprocessmodule. The execution is handled through argument lists to avoid shell injection, which is appropriate and necessary for the skill's intended purpose of network security assessment. - [EXTERNAL_DOWNLOADS]: The skill references the retrieval of certificate transparency logs from
crt.sh. This is a well-known and reputable service for domain reconnaissance, and its use is documented as a standard step in the penetration testing workflow. - [SAFE]: The skill contains a vulnerability surface for indirect prompt injection by processing external tool outputs to guide automation.
- Ingestion points:
scripts/process.pyreads and processes the output of thesubfindertool fromsubdomains_subfinder.txt. - Capability inventory: The skill has the capability to perform network scanning and execute shell commands via
subprocess.runbased on the targets identified. - Boundary markers: There are no explicit delimiters or boundary markers used to isolate data retrieved from external tools from the internal control logic.
- Sanitization: No sanitization or validation is applied to the subdomain strings or tool outputs before they are used to populate subsequent command arguments.
Audit Metadata