skills/masriyan/claude-code-cybersecurity-skill/Web Application Security Testing/Gen Agent Trust Hub
Web Application Security Testing
Pass
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [SAFE]: The skill is a legitimate security testing tool designed for OWASP Top 10 assessments. The included code performs standard reconnaissance and vulnerability scanning tasks consistent with its stated purpose.
- [COMMAND_EXECUTION]: The skill documentation and examples provide commands for executing the Python script
scripts/owasp_scanner.pyvia the command line to perform scans on user-defined targets. - [EXTERNAL_DOWNLOADS]: The skill requires installation of standard, well-known Python libraries (
requests,beautifulsoup4,urllib3,lxml) for its operation. - [PROMPT_INJECTION]: The skill has an indirect prompt injection surface as it ingests and processes untrusted data from external web targets.
- Ingestion points: HTTP response headers and body content fetched from target URLs in
scripts/owasp_scanner.py. - Boundary markers: Absent. There are no delimiters or warnings to isolate external content from the agent's instructions.
- Capability inventory: Network communication capabilities are present via the
requestslibrary inscripts/owasp_scanner.py. - Sanitization: No sanitization or validation of external response content is performed before processing.
Audit Metadata