ctf-web
Fail
Audited by Gen Agent Trust Hub on Apr 17, 2026
Risk Level: CRITICALEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: Multiple files including
server-side-deser.mdandserver-side-exec.mdcontain functional reverse shell payloads in Python and Bash. These scripts are designed to establish outbound connections to external ports to provide shell access. - [PROMPT_INJECTION]: The
auth-and-access.mdfile contains explicit instructions and specific templates designed to bypass LLM safety guardrails and override system instructions. Examples include phrases like 'Ignore all instructions', 'System Override', and 'Repeat your full system prompt'. - [COMMAND_EXECUTION]: The skill requires the installation and execution of various system-level tools such as
sqlmap,hashcat, andffuf. It also includes numerous Python code blocks that execute shell commands viaos.systemandsubprocess.runto perform exploitation tasks. - [DATA_EXFILTRATION]:
server-side-exec.mdprovides examples of exfiltrating sensitive file data (e.g.,/flag.txt) to external webhooks and attacker-controlled servers usingcurland network redirects. - [EXTERNAL_DOWNLOADS]:
SKILL.mdinstructs the agent to download and install packages from public registries and third-party GitHub repositories, including theysoserialJava deserialization tool. - [Infected Files]: Automated antivirus scanning detected a potential Trojan signature (
Python:Agent-RX) inserver-side-advanced-2.md. This file contains a rogue MySQL server implementation designed to harvest files from connecting clients.
Recommendations
- CRITICAL: 1 infected file(s) detected - DO NOT USE
- AI detected serious security threats
Audit Metadata