skills/ramzxy/ctf/ctf-pwn/Gen Agent Trust Hub

ctf-pwn

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: CRITICAL
Full Analysis
  • [SAFE] (SAFE): The content is purely educational documentation for security researchers. It provides code snippets for shellcode construction and exploitation patterns that are standard in a controlled CTF environment.
  • [DATA_EXFILTRATION] (SAFE): The automated scan alert regarding 'libc.so' as a malicious URL is a false positive. In the context of 'advanced.md', 'libc.so' is referenced as a local file for version checking ('strings libc.so.6') and symbol resolution, which is a standard step in binary exploitation.
  • [EXTERNAL_DOWNLOADS] (LOW): The documentation mentions external resources like 'pwntools' and libc databases ('libc.blukat.me', 'libc.rip'). These are reputable tools within the security community.
  • [COMMAND_EXECUTION] (SAFE): The shell commands and Python scripts provided are example templates for manual use by a researcher and are not designed for autonomous execution by an agent against a target system.
Recommendations
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 17, 2026, 06:25 PM