transferring-files
Fail
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFE
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill contains several high-risk patterns for executing code directly from remote servers. This includes piping remote scripts to shells (curl | bash), using PowerShell's Invoke-Expression (IEX) to run remote strings, and utilizing built-in Windows utilities like mshta and regsvr32 to execute remote payloads.
- [DATA_EXFILTRATION]: Explicit instructions are provided for exfiltrating sensitive data, including system files like /etc/passwd. Methods described include using HTTP POST requests, DNS tunneling, and ICMP (ping) packets to move data out of a network.
- [COMMAND_EXECUTION]: The skill provides commands to execute system-level operations via database services, such as using xp_cmdshell in MSSQL and COPY ... TO PROGRAM in PostgreSQL, which can be used to run arbitrary downloads or tools.
- [EXTERNAL_DOWNLOADS]: Multiple examples demonstrate downloading executable files and scripts from external IP addresses (e.g., 10.10.10.10) using tools like certutil, bitsadmin, wget, and curl.
- [CREDENTIALS_UNSAFE]: The skill includes examples with hardcoded placeholder credentials (e.g., user:password) and demonstrates automated FTP scripts containing plaintext credentials.
Recommendations
- HIGH: Downloads and executes remote code from: http://10.10.10.10:8000/file, http://10.10.10.10/script.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata