skills/mukul975/anthropic-cybersecurity-skills/performing-subdomain-enumeration-with-subfinder/Gen Agent Trust Hub
performing-subdomain-enumeration-with-subfinder
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The Python scripts (
scripts/agent.pyandscripts/process.py) use thesubprocess.runmethod to execute external security utilities (subfinder,httpx,dnsx,dig). The command arguments are passed as lists rather than shell strings, which effectively mitigates shell injection risks. - [EXTERNAL_DOWNLOADS]: The documentation in
SKILL.mdprovides instructions for the user to install third-party security tools from their official GitHub repositories (e.g.,github.com/projectdiscovery/*). These are well-known, industry-standard tools for penetration testing and are considered safe sources for this context. - [PROMPT_INJECTION]: The instructions within the markdown files are purely technical and do not contain any patterns intended to bypass AI safety filters or override system instructions.
- [DATA_EXFILTRATION]: There are no network operations performed by the scripts themselves to transmit data to unknown domains. Reconnaissance results are stored locally in the
./reconor./recon_outputdirectories for the user. - [CREDENTIALS_UNSAFE]: The documentation provides placeholders for API keys (e.g.,
YOUR_SHODAN_API_KEY) and instructs the user on how to configure them locally. No actual hardcoded secrets or sensitive credentials were found in the skill files.
Audit Metadata