skills/mukul975/anthropic-cybersecurity-skills/performing-web-cache-deception-attack/Gen Agent Trust Hub
performing-web-cache-deception-attack
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The documentation in
SKILL.mdincludes multiple functional shell command examples usingcurlandgrepto analyze HTTP headers and test for path-based cache deception. - [DATA_EXFILTRATION]: The
scripts/agent.pyscript performs outbound network requests to a user-providedtarget_urlusing therequestslibrary. This is intended for the primary purpose of identifying caching vulnerabilities in web applications. - [PROMPT_INJECTION]: This skill presents an indirect prompt injection surface (Category 8).
- Ingestion points: The
scripts/agent.pyscript ingests the full response body of external web pages when testing for path confusion and PII exposure. - Boundary markers: The skill does not implement boundary markers or instructions to isolate the ingested external content from the agent's processing logic.
- Capability inventory: The script uses
requests.getto fetch external content andprintto generate JSON reports containing data from those responses. - Sanitization: No sanitization or escaping is performed on the data fetched from external URLs before it is output, which could allow malicious content from a target site to influence the agent's behavior.
Audit Metadata