ctf-misc
Pass
Audited by Gen Agent Trust Hub on Apr 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill provides extensive documentation on shell escapes and command execution techniques, such as exploiting SUID binaries, utilizing the
dockergroup for root access, and manipulating restricted bash environments using$0and arithmetic expansion. - [REMOTE_CODE_EXECUTION]: Detailed instructions are provided for achieving code execution through deserialization vulnerabilities (Python
marshal), template injection (XSLT), and service-specific features like PostgreSQL'sCOPY TO PROGRAM. - [DATA_EXFILTRATION]: Methods for exfiltrating data are described, including DNS tunneling, the use of bash's
/dev/tcpvirtual files, and specialized Unicode steganography using Variation Selectors or the Tags Block. - [EXTERNAL_DOWNLOADS]: The skill instructs the agent to install several well-known security and data processing libraries (e.g.,
pwntools,z3-solver,Pillow) from official package registries to support challenge solving. - [PROMPT_INJECTION]: As the skill is designed to process untrusted data from CTF challenges (files, PCAPs, network responses) and has high execution capabilities, it presents a surface for indirect prompt injection. However, this is inherent to its purpose as a security research tool.
Audit Metadata