cmdi-command-injection

Fail

Audited by Gen Agent Trust Hub on Apr 10, 2026

Risk Level: CRITICALCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATION
Full Analysis
  • [COMMAND_EXECUTION]: The skill provides a library of shell metacharacters and injection operators (e.g., ;, &&, $(...), |) and demonstrates their application in vulnerable code patterns across multiple programming languages including PHP, Python, and Node.js.\n- [REMOTE_CODE_EXECUTION]: Contains numerous functional payloads for initiating reverse shells on Linux and Windows systems using tools like Bash, Python, Perl, and PowerShell.\n- [DATA_EXFILTRATION]: Details techniques for harvesting sensitive information, such as user credentials from /etc/passwd and environment-stored secrets, and transmitting them to external hosts via DNS and HTTP protocols.\n- [COMMAND_EXECUTION]: Describes advanced evasion techniques, including WAF bypass via wildcard expansion, Internal Field Separator ($IFS) substitution, and obfuscated string construction in PHP to execute restricted functions.
Recommendations
  • CRITICAL: 1 infected file(s) detected - DO NOT USE
  • AI detected serious security threats
Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 10, 2026, 06:18 AM