cmdi-command-injection
Fail
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: CRITICALCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides a library of shell metacharacters and injection operators (e.g.,
;,&&,$(...),|) and demonstrates their application in vulnerable code patterns across multiple programming languages including PHP, Python, and Node.js.\n- [REMOTE_CODE_EXECUTION]: Contains numerous functional payloads for initiating reverse shells on Linux and Windows systems using tools like Bash, Python, Perl, and PowerShell.\n- [DATA_EXFILTRATION]: Details techniques for harvesting sensitive information, such as user credentials from /etc/passwd and environment-stored secrets, and transmitting them to external hosts via DNS and HTTP protocols.\n- [COMMAND_EXECUTION]: Describes advanced evasion techniques, including WAF bypass via wildcard expansion, Internal Field Separator ($IFS) substitution, and obfuscated string construction in PHP to execute restricted functions.
Recommendations
- CRITICAL: 1 infected file(s) detected - DO NOT USE
- AI detected serious security threats
Audit Metadata