skills/mukul975/anthropic-cybersecurity-skills/performing-web-cache-poisoning-attack/Gen Agent Trust Hub
performing-web-cache-poisoning-attack
Pass
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/agent.pyscript executes network requests using the Pythonrequestslibrary to scan and interact with target URLs provided as command-line arguments. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection attack surface. * Ingestion points: The
scripts/agent.pyscript captures untrusted data from remote HTTP response headers and response bodies (lines 105, 142). * Boundary markers: Absent; theprint_reportfunction inscripts/agent.py(line 172) does not implement delimiters or 'ignore embedded instructions' warnings to isolate external data from the tool's output. * Capability inventory: The tool has network access capabilities through therequestslibrary. * Sanitization: Absent; the script reflects values retrieved from the remote target directly into the console output without escaping or validation.
Audit Metadata