skills/mukul975/anthropic-cybersecurity-skills/conducting-internal-reconnaissance-with-bloodhound-ce/Gen Agent Trust Hub
conducting-internal-reconnaissance-with-bloodhound-ce
Fail
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The deployment instructions in
SKILL.md(Phase 1) command the user to fetch adocker-compose.ymlfile from a URL shortener (https://ghst.ly/getbhce). The use of redirection services masks the true destination and origin of the configuration file, preventing manual or automated source verification. - [REMOTE_CODE_EXECUTION]: Immediately after the download, the skill instructs the user to run
docker compose up -d. This pattern executes the contents of the unverified YAML file, which could be configured to deploy malicious images, mount sensitive host directories to containers, or grant containers excessive privileges to compromise the host system. - [COMMAND_EXECUTION]: The file
scripts/agent.pyuses thesubprocess.runfunction to execute thebloodhound-pythoncommand-line tool. Although it passes arguments as a list, it facilitates the execution of external binaries using credentials and domain information provided by the user via command-line arguments.
Recommendations
- HIGH: Downloads and executes remote code from: https://ghst.ly/getbhce - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata