ssti-server-side-template-injection

Fail

Audited by Gen Agent Trust Hub on Apr 10, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The skill provides detailed chains for achieving remote code execution across a wide variety of template engines and programming languages, including Jinja2, FreeMarker, Twig, Velocity, and multiple Node.js engines.
  • [COMMAND_EXECUTION]: Included payloads leverage high-risk system calls such as os.popen, system, and child_process.execSync to execute arbitrary commands on target systems.
  • [DATA_EXFILTRATION]: Provides instructions for reading highly sensitive files, including /etc/passwd and ~/.aws/credentials, and describes Out-Of-Band (OOB) techniques for sending this data to external attacker-controlled infrastructure.
  • [OBFUSCATION]: Explains and provides examples of using Base64, hex encoding, and Unicode character escapes to conceal malicious payloads and bypass character-based security filters.
  • [PERSISTENCE_MECHANISMS]: Explicitly details establishing a reverse shell as a method for maintaining persistent access to a compromised environment.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Apr 10, 2026, 06:19 AM