skills/mukul975/anthropic-cybersecurity-skills/reverse-engineering-malware-with-ghidra/Gen Agent Trust Hub
reverse-engineering-malware-with-ghidra
Pass
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/agent.pyfile uses thesubprocessmodule to execute the GhidraanalyzeHeadlessutility to automate disassembly and decompilation tasks. - [COMMAND_EXECUTION]: The agent dynamically generates a Python script (
export_functions.py) which is then executed within the Ghidra environment to automate data extraction. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it processes untrusted malware binaries that may contain malicious instructions in their strings or metadata. Ingestion points: Malware binaries are analyzed via
r2pipeand Ghidra inscripts/agent.py. Boundary markers: No explicit markers or instructions to ignore embedded content are provided in the workflow. Capability inventory: The agent can execute shell commands viasubprocess.runand write files to the disk. Sanitization: The skill does not sanitize strings or metadata extracted from binary files before reporting them. - [EXTERNAL_DOWNLOADS]: The documentation references downloading Ghidra from its official website (
ghidra-sre.org), which is a well-known service for security analysis tools.
Audit Metadata