performing-web-cache-poisoning-attack

Pass

Audited by Gen Agent Trust Hub on Apr 7, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The scripts/agent.py script executes network requests using the Python requests library to scan and interact with target URLs provided as command-line arguments.
  • [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection attack surface. * Ingestion points: The scripts/agent.py script captures untrusted data from remote HTTP response headers and response bodies (lines 105, 142). * Boundary markers: Absent; the print_report function in scripts/agent.py (line 172) does not implement delimiters or 'ignore embedded instructions' warnings to isolate external data from the tool's output. * Capability inventory: The tool has network access capabilities through the requests library. * Sanitization: Absent; the script reflects values retrieved from the remote target directly into the console output without escaping or validation.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 7, 2026, 01:02 PM