Pentest Commands
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill provides numerous commands for invasive tools like
nmap,nikto, andsqlmapthat allow an agent to actively probe and exploit network infrastructure. - Evidence: Commands such as
nmap --script vulnfor automated vulnerability scanning andsqlmap --os-shellfor gaining remote command execution via SQL injection. - [REMOTE_CODE_EXECUTION] (HIGH): The skill includes instructions for using
msfvenomto generate malicious payloads (reverse shells) for multiple platforms (Windows, Linux, Web). - Evidence:
msfvenom -p windows/meterpreter/reverse_tcp LHOST=... -f exe > shell.exeand similar commands for PHP, Python, and Java payloads. - [CREDENTIALS_UNSAFE] (HIGH): The skill provides automated brute-force and password cracking command references, facilitating unauthorized access to various services.
- Evidence:
hydracommands targeting SSH, FTP, RDP, and SMB, along withjohnthe ripper commands for cracking local password files and SSH keys. - [PRIVILEGE ESCALATION] (MEDIUM): Some commands, such as
airmon-ng start, typically require administrative or root-level privileges to interact with hardware at a low level. - Evidence: Commands in the
Aircrack-ngsection require monitor mode which usually demands sudo/root access.
Recommendations
- AI detected serious security threats
Audit Metadata