skills/mukul975/anthropic-cybersecurity-skills/reverse-engineering-dotnet-malware-with-dnspy/Gen Agent Trust Hub
reverse-engineering-dotnet-malware-with-dnspy
Pass
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The Python agent script utilizes standard subprocess calls to interact with local security tools including Detect It Easy (diec), de4dot, and monodis. These interactions are implemented using secure list-based arguments to prevent injection.
- [EXTERNAL_DOWNLOADS]: The documentation references official GitHub repositories for established malware analysis tools. These are well-known resources within the cybersecurity community and do not represent a security risk.
- [DATA_EXFILTRATION]: The skill performs string extraction to identify potential Indicators of Compromise (IOCs) such as C2 servers and registry keys from analyzed binaries. This data is printed for the user and is not transmitted to any external third parties.
- [INDIRECT_PROMPT_INJECTION]: The skill involves processing potentially malicious binary data. It implements static analysis techniques and does not introduce risk by interpolating untrusted data directly into model instructions.
Audit Metadata