skills/mukul975/anthropic-cybersecurity-skills/performing-subdomain-enumeration-with-subfinder/Gen Agent Trust Hub
performing-subdomain-enumeration-with-subfinder
Pass
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill instructs the user to install security utilities from reputable sources, specifically ProjectDiscovery's official GitHub repository and the OWASP organization.
- [COMMAND_EXECUTION]: The Python scripts
scripts/agent.pyandscripts/process.pyfacilitate the automation of security tools using thesubprocessmodule. The implementation uses list-based arguments, which is a secure pattern that prevents command injection by ensuring inputs are not interpreted by a shell. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it processes untrusted reconnaissance data from the internet.
- Ingestion points: The scripts ingest hostnames, HTTP titles, and CNAME records discovered via
subfinder,httpx, anddnsx(referenced inscripts/agent.pyandscripts/process.py). - Boundary markers: The generated reports do not utilize delimiters or specific instructions to isolate or ignore potentially malicious content embedded in the discovered network data.
- Capability inventory: The skill possesses the ability to execute CLI tools via subprocesses and perform filesystem write operations to save findings.
- Sanitization: There is no evidence of string validation or sanitization for the data retrieved from external targets before it is included in the final Markdown and JSON reports.
Audit Metadata