tech-stack-teardown
Pass
Audited by Gen Agent Trust Hub on Apr 11, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/recon.pyexecutes system commandsdigandcurlto gather DNS records and website HTML. The implementation uses list-based arguments without a shell, which prevents command injection from user-supplied domain names. - [EXTERNAL_DOWNLOADS]: The skill requires the installation of
requestsandpython-dotenvPython packages via pip. It also interacts with the Apify API for technology profiling, which is a well-known service. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests untrusted HTML content from target websites.
- Ingestion points:
scripts/recon.py(fetches website source code viacurl). - Boundary markers: Absent; the agent is directed to present findings based on the scraped content without specific delimiters or instructions to ignore potential commands embedded in the source code.
- Capability inventory: Subprocess execution (
dig,curl), network requests (requeststo Apify), and file system writing (via the--outputflag). - Sanitization: The script performs regex-based extraction for specific technology signatures but provides the broader results to the agent for summarization and assessment.
Audit Metadata