skills/mukul975/anthropic-cybersecurity-skills/exploiting-deeplink-vulnerabilities/Gen Agent Trust Hub
exploiting-deeplink-vulnerabilities
Pass
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyutilizes thesubprocess.check_outputfunction to invoke the Android Debug Bridge (ADB) command-line tool. This is a functional requirement of the skill to programmatically trigger deep link handling on a connected mobile device or emulator for vulnerability assessment. The implementation uses list-based execution, which mitigates standard shell injection risks. - [COMMAND_EXECUTION]: The documentation in
SKILL.mdand automated generation inscripts/process.pyprovide variousadb shell am startcommands. These commands are designed to test for vulnerabilities such as open redirects, path traversal, and JavaScript injection within the target application's WebView. This behavior is consistent with the skill's primary purpose as a penetration testing tool. - [SAFE]: The skill processes mobile application configuration files (
AndroidManifest.xmlandInfo.plist) to identify potential attack surfaces. While these are external data sources, the processing is handled using standard libraries and regular expressions for analysis purposes. - Ingestion points:
AndroidManifest.xmlandInfo.plistfiles are ingested and parsed inscripts/agent.pyandscripts/process.py. - Boundary markers: None present; the skill treats the configuration files as structured data to be parsed.
- Capability inventory: Command execution via
adbinscripts/agent.pyand local file read/write for report generation. - Sanitization: The scripts use standard XML parsing (ElementTree) and regex for extraction. Parameters used in command execution are passed via argument lists rather than shell strings.
Audit Metadata