skills/mukul975/anthropic-cybersecurity-skills/performing-wireless-network-penetration-test/Gen Agent Trust Hub
performing-wireless-network-penetration-test
Pass
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/agent.pyscript automates wireless reconnaissance and handshake capturing by executing system tools includingairmon-ng,airodump-ng,aircrack-ng, andwash. These commands are executed usingsubprocess.runwith argument lists, which prevents shell injection vulnerabilities. - [COMMAND_EXECUTION]: The
SKILL.mdfile contains several manual bash commands for advanced penetration testing tasks such as deauthentication attacks (aireplay-ng), WPA2-Enterprise rogue access point creation (hostapd-mana), and WPS brute-forcing (reaver). These are standard tools for the skill's stated purpose. - [DATA_EXPOSURE]: The skill facilitates the capture of wireless handshakes and the generation of security reports containing network metadata (BSSIDs, encryption types, signal strength). These operations are restricted to local file system writes in the
./wireless_pentestand./resultsdirectories, with no evidence of external data exfiltration. - [METADATA_POISONING]: A minor discrepancy exists between the author name listed in the
SKILL.mdfrontmatter ('mahipal') and the author context provided ('mukul975'). This does not appear to be malicious but is noted for technical accuracy.
Audit Metadata