skills/mukul975/anthropic-cybersecurity-skills/performing-web-cache-poisoning-attack/Gen Agent Trust Hub
performing-web-cache-poisoning-attack
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [SAFE]: The skill is a legitimate security testing utility focused on identifying web cache poisoning vulnerabilities. All identified functionalities align with the stated purpose of cybersecurity assessment.
- [COMMAND_EXECUTION]: The documentation provides standard
curlcommands for manual cache testing, which is appropriate for a penetration testing guide. These commands are for the user to run manually and are not executed automatically by the agent in a hidden manner. - [EXTERNAL_DOWNLOADS]: The Python script uses the
requestslibrary for HTTP communication. This is a standard, well-known dependency. While the script disables SSL verification (verify=False), this is common in security tools to handle various testing environments and does not constitute a malicious finding. - [PROMPT_INJECTION]: The skill possesses a surface for indirect prompt injection as it ingests untrusted data from external web pages. However, this risk is associated with the primary purpose of identifying reflected headers in cache tests and does not lead to harmful outcomes in this context. Ingestion points:
scripts/agent.pyreads response bodies from the target URL. Boundary markers: Absent; the content is searched for reflections of injected headers. Capability inventory: HTTP network requests via therequestslibrary. Sanitization: Absent; the script checks for raw string matches in the response text.
Audit Metadata