pentest-validation
Pass
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill is designed to perform graduated exploitation, which involves executing network-level commands and browser-based automation.
- Evidence: Explicitly utilizes
curl,wget, andPlaywrightto test for vulnerabilities in theInjection,XSS, andSSRFpipelines (SKILL.md). - Evidence: Mentions proving command injection using
exec()andsystem()calls as part of the validation process (SKILL.md). - [DATA_EXFILTRATION]: The skill incorporates techniques for data extraction as a means of proving vulnerability exploitability.
- Evidence: The SSRF pipeline includes targets for cloud metadata extraction (e.g.,
169.254.169.254) and protocol smuggling (file:///etc/passwd) (SKILL.md). - Evidence: The SQL injection pipeline includes patterns for
UNION SELECTdata extraction (SKILL.md). - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to its automated processing of external content from target URLs.
- Ingestion points: The agent ingests untrusted data from
target_urlusing DAST tools andPlaywright(SKILL.md). - Boundary markers: No explicit boundary markers or instructions to ignore embedded instructions in the retrieved content are present in the provided documentation.
- Capability inventory: High-privilege capabilities include network operations (
curl,wget), file system access via protocol smuggling tests, and browser control (Playwright). - Sanitization: No sanitization logic for external content is specified before the data is processed by the exploitation pipelines.
- [EXTERNAL_DOWNLOADS]: The skill performs dynamic network requests to external, user-provided URLs.
- Evidence: Configuration requires a
target_urlwhich is then accessed via multiple validation tiers (SKILL.md).
Audit Metadata