system
Fail
Audited by Gen Agent Trust Hub on May 2, 2026
Risk Level: CRITICALCOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill provides functional code and instructions for destructive system manipulation and persistent access.
reference/system-exploitation.mdcontains a Python implementation designed to replace/usr/bin/bashwith a trojan wrapper that creates a SUID shell. The script usesos.O_TRUNCto bypass file locks, facilitating unauthorized privilege escalation.- Contains multiple examples of using
chmod 777on critical system paths and performing binary replacements to intercept root processes. - [DATA_EXFILTRATION]: Functional code is provided for the silent extraction of sensitive user and system information.
reference/system-exploitation.mdincludes a Python implementation for "In-Process DPAPI Browser Credential Extraction" using the WindowsCryptUnprotectDataAPI to decrypt and steal saved passwords from Chromium-based browsers.- Describes methodologies for exfiltrating the Active Directory
ntds.ditdatabase and harvesting LSA secrets via privileged filesystem operations. - [REMOTE_CODE_EXECUTION]: The skill contains exploit templates and payloads for triggering remote code execution.
- Provides Python exploit templates with embedded shellcode for stack-based buffer overflows.
- Contains detailed instructions for deploying remote exploits like EternalBlue (CVE-2017-0144) and PrintNightmare (CVE-2021-34527).
- [CREDENTIALS_UNSAFE]: Directs the agent to perform extensive searches for hardcoded credentials across various system and application configuration files.
- Lists specific paths for harvesting secrets from Ruby, Python, and Node.js environments (
.bundle/config,.pypirc,.npmrc) and content management systems (wp-config.php). - [EXTERNAL_DOWNLOADS]: Recommends fetching and executing unverifiable scripts from remote, non-standard servers.
- Instructions include downloading enumeration scripts and malicious payloads from arbitrary attacker-controlled IP addresses using
curlandwget.
Recommendations
- CRITICAL: 1 infected file(s) detected - DO NOT USE
- AI detected serious security threats
Audit Metadata