Red Team Tools and Methodology
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The skill provides complex bash one-liners and a standalone shell script (
recon.sh) that execute multiple third-party security tools (Amass, Subfinder, Nuclei, ffuf, etc.). This gives the agent direct control over the underlying system's shell. - DATA_EXFILTRATION (LOW): While intended for reconnaissance, the workflow is designed to extract information about target infrastructure and potentially transmit data to external endpoints via tools like
curland various scanners. - EXTERNAL_DOWNLOADS (LOW): The skill fetches data from external, untrusted sources such as
bgp.he.net,waybackurls, andgau. This content is directly processed by further tools in the pipeline. - Indirect Prompt Injection (LOW): The skill possesses a high vulnerability surface for indirect injection.
- Ingestion points: Output from
waybackurls,gau, andsubfinder(found in sections 5, 7, and 10). - Boundary markers: Absent; data is handled as raw strings in shell pipes.
- Capability inventory:
bashsubprocess execution,curlnetwork requests, andnucleivulnerability scanning. - Sanitization: None; the scripts pipe external data directly into powerful command-line tools without escaping or validation.
Audit Metadata