testing-apis
Warn
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides instructions for using various command-line utilities for API discovery and testing, including ffuf, gobuster, wfuzz, arjun, nuclei, and zap-cli.
- [EXTERNAL_DOWNLOADS]: The skill facilitates downloading and running security tools from remote repositories, notably Microsoft's RESTler fuzzer on GitHub, and references resources from OWASP and PayloadsAllTheThings.
- [PROMPT_INJECTION]: The skill includes a variety of offensive payloads for SQL injection, command injection, NoSQL injection, and XXE attacks intended for vulnerability verification.
- [DATA_EXFILTRATION]: Methodologies are provided for accessing sensitive system files such as /etc/passwd as part of testing for local file inclusion and injection vulnerabilities.
- [PROMPT_INJECTION]: The skill processes external, untrusted data from API responses and Swagger documentation, presenting an indirect injection surface.
- Ingestion points: Untrusted content is ingested via network requests to API endpoints and documentation files.
- Boundary markers: No explicit delimiters or instructions are used to isolate potentially malicious instructions within the fetched data.
- Capability inventory: The skill maintains significant capabilities, including network access and the execution of multiple scanning and exploitation tools.
- Sanitization: There is no evidence of validation or sanitization for the data retrieved from external sources before processing.
Audit Metadata