skills/mukul975/anthropic-cybersecurity-skills/testing-for-xxe-injection-vulnerabilities/Gen Agent Trust Hub
testing-for-xxe-injection-vulnerabilities
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTIONREMOTE_CODE_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill recommends downloading the XXEinjector exploitation tool from a third-party GitHub repository (enjoiz/XXEinjector) which is not part of the verified trusted vendors list.
- [REMOTE_CODE_EXECUTION]: Provides instructions to clone and potentially execute code from an external repository (XXEinjector). While common in security workflows, this represents an unverifiable dependency risk.
- [COMMAND_EXECUTION]: Includes numerous shell commands for manual testing, such as
curlfor interacting with web APIs,python -m http.serverfor hosting malicious DTD files, and archive utilities likezip/unzipfor manipulating XML-based file formats like DOCX and XLSX. - [DATA_EXFILTRATION]: Contains multiple XML payloads and automated routines in
scripts/agent.pydesigned to exfiltrate sensitive server data, including/etc/passwd, Windows configuration files, and cloud environment metadata via SSRF. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8) due to the processing of untrusted data from target server responses.
- Ingestion points: The
test_xxe_payloadsfunction inscripts/agent.pycaptures and evaluatesresp.textfrom the target server to detect successful injection. - Boundary markers: No delimiters or safety instructions are used to prevent the agent from being influenced by malicious content returned in the target response body.
- Capability inventory: The script has the capability to perform network requests via
requests.postand write findings to the local filesystem viagenerate_report. - Sanitization: There is no evidence of sanitization or filtering of the captured response content before it is used in the agent's logic.
Audit Metadata