skills/mukul975/anthropic-cybersecurity-skills/reverse-engineering-malware-with-ghidra/Gen Agent Trust Hub
reverse-engineering-malware-with-ghidra
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/agent.pyfile uses thesubprocessmodule to execute Ghidra'sanalyzeHeadlesstool and Radare2 viar2pipe. These calls are constructed as argument lists rather than shell strings, which follows security best practices to prevent command injection. - [PROMPT_INJECTION]: The skill is designed to process untrusted binary data (Category 8: Indirect Prompt Injection surface).
- Ingestion points: Malware samples are ingested via the
filepathargument in the main analysis function inscripts/agent.py. - Boundary markers: The
SKILL.mddocumentation provides clear instructions to use an isolated VM for analysis, establishing a logical safety boundary. - Capability inventory: The agent is capable of reading local files, executing analysis sub-processes, and writing output to the
/tmp/directory. - Sanitization: Input paths are passed directly to subprocess argument lists, providing inherent protection against common shell-based injection attacks.
- [COMMAND_EXECUTION]: The script
scripts/agent.pydynamically generates a temporary Python script (export_functions.py) which is subsequently executed by the Ghidra engine. This generation uses a hardcoded template and is a standard technique for automating Ghidra's headless analyzer. - [SAFE]: The external URLs referenced in
SKILL.mdpoint to official project sites likeghidra-sre.org. Examples of malicious URLs in the documentation are properly defanged (e.g., usinghxxpsand[.]) to prevent accidental execution or navigation.
Audit Metadata