skills/mukul975/anthropic-cybersecurity-skills/performing-web-application-scanning-with-nikto/Gen Agent Trust Hub
performing-web-application-scanning-with-nikto
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The automation scripts
scripts/agent.pyandscripts/process.pyexecute theniktobinary using thesubprocessmodule. Commands are constructed using lists rather than shell strings, which effectively prevents shell injection vulnerabilities. - [EXTERNAL_DOWNLOADS]: The skill documentation and scripts reference the
niktoscanner, a well-known open-source security tool. It requires the tool to be pre-installed on the system (e.g., viaapt install nikto). - [PROMPT_INJECTION]: The skill ingests data from external web servers (headers, banners, and file paths) via Nikto scan results. This data is parsed and included in structured reports, representing a potential surface for indirect injection if the output is later processed by an LLM without proper sanitization. * Ingestion points: XML parsing logic in
scripts/agent.pyandscripts/process.pywhich extracts finding descriptions and URIs. * Boundary markers: No specific delimiters or instructions are used to separate untrusted scan data from agent instructions in the output reports. * Capability inventory: The skill is capable of performing network requests to arbitrary targets via theniktotool. * Sanitization:scripts/process.pycorrectly utilizes thedefusedxmllibrary to prevent XML external entity (XXE) attacks. However, the HTML report generator inscripts/process.pyinterpolates finding descriptions directly into HTML templates without escaping, which could allow for cross-site scripting (XSS) if scan results contain malicious payloads. - [CREDENTIALS_UNSAFE]: The implementation guide in
SKILL.mdincludes an example command demonstrating how to scan with authentication using the-id admin:passwordflag. Providing credentials directly in the command line is generally discouraged as it may expose them in process monitors and shell history.
Audit Metadata