coordination
Pass
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [INDIRECT_PROMPT_INJECTION]: The skill orchestrates a multi-phase pentest engagement that processes untrusted data from target server responses and external reconnaissance tool outputs.
- Ingestion points: Findings stored in
outputs/data/findings/and raw tool outputs located inoutputs/processed/reconnaissance/raw/. - Boundary markers: None identified. The instructions for the
pentester-validatorand the report generation phases do not include explicit delimiters or warnings to ignore instructions embedded in the ingested findings. - Capability inventory: The
pentester-validatoragent has the capability to execute Python scripts (poc.py) and search through raw scan files (reference/VALIDATION.md). - Sanitization: There is no documented mechanism for sanitizing or escaping technical evidence before it is included in the final branded PDF report or analyzed by the validator subagent.
- [COMMAND_EXECUTION]: The validation workflow includes the dynamic execution of generated scripts to verify security findings.
- Evidence:
reference/VALIDATION.mdspecifies that thepentester-validatoragent runspoc.pyto ensure PoCs are functional. While the skill suggests usingast.parse()for syntax verification, the runtime execution of scripts that may be influenced by data gathered from a target environment presents a local execution risk. - [EXTERNAL_DOWNLOADS]: The skill integrates with external security research repositories to fetch testing payloads.
- Evidence:
PATT_STANDARD.mddefines a standard for retrieving and curating payloads from the PayloadsAllTheThings GitHub repository (github.com/swisskyrepo/PayloadsAllTheThings). This is used to populate attack vectors within the skill's infrastructure.
Audit Metadata