skills/mukul975/anthropic-cybersecurity-skills/performing-jwt-none-algorithm-attack/Gen Agent Trust Hub
performing-jwt-none-algorithm-attack
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/agent.pyscript executes network requests and file reads based on user-provided CLI arguments, which is expected for a security research tool.\n - The
testcommand uses therequestslibrary to send HTTP GET requests to a user-defined target URL.\n - The
confusecommand reads from a local file path provided by the user to facilitate RSA-to-HMAC algorithm confusion tests.\n- [EXTERNAL_DOWNLOADS]: The documentation references therequestslibrary, which is a well-known and trusted third-party Python package. Users are instructed to install it via standard package managers for endpoint testing functionality.\n- [PROMPT_INJECTION]: The skill has an indirect prompt injection surface due to the ingestion of untrusted data (URLs and tokens). Since the tool is intended for manual security testing, the risk is inherent to its primary purpose.\n - Ingestion points: User-supplied
target_urlandtokenparameters in thescripts/agent.pyscript.\n - Boundary markers: Absent; the tool processes input strings directly as provided by the user.\n
- Capability inventory: Includes network access via
requests.getand file system reads viaopen().read().\n - Sanitization: None; input is used verbatim for testing purposes.
Audit Metadata