skills/ramzxy/ctf/ctf-misc/Gen Agent Trust Hub

ctf-misc

Warn

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
  • COMMAND_EXECUTION (MEDIUM): The file bashjails.md provides specific payloads (e.g., $$#) and methodologies designed to bypass restricted shell environments and spawn interactive Bash shells.\n- REMOTE_CODE_EXECUTION (MEDIUM): The file pyjails.md contains multiple Python sandbox escape techniques, including the use of subclasses and decorator-based chains to access the os module and execute arbitrary system commands.\n- COMMAND_EXECUTION (MEDIUM): The skill includes a 'Privilege Escalation Checklist' and scripts for scanning /proc/ to discover internal services, sensitive command-line arguments, and processes with elevated capabilities.\n- DATA_EXFILTRATION (LOW): Several scripts utilize the pwntools library (pwn.remote) to establish network connections, which can be used to send or receive data from remote hosts during exploitation.\n- EXTERNAL_DOWNLOADS (LOW): The documentation references external security tools and scripts such as pyinstxtractor.py and zbarimg as dependencies for solving specific challenge types.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 17, 2026, 06:17 PM