skills/mukul975/anthropic-cybersecurity-skills/exploiting-http-request-smuggling/Gen Agent Trust Hub
exploiting-http-request-smuggling
Warn
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill instructs the agent to clone external code repositories from third-party sources, specifically
github.com/defparam/smuggler.gitandgithub.com/BishopFox/h2cSmuggler.git. These sources are not included in the verified trusted organizations list. - [DATA_EXFILTRATION]: The documentation in
SKILL.mdprovides explicit instructions for performing session hijacking. 'Attack 2' describes a method to capture other users' requests, including sensitive session cookies and authorization headers, by smuggling a partial request that causes the target application to append the next user's data into a public-facing field like a comment body. - [COMMAND_EXECUTION]: The provided
scripts/agent.pyperforms low-level network operations using raw sockets to bypass standard HTTP parsing. Additionally, the script explicitly disables SSL certificate verification (ssl.CERT_NONE), which is a security best-practice violation that could expose the connection to man-in-the-middle attacks. - [INDIRECT_PROMPT_INJECTION]: The skill features a data ingestion point where user-supplied URLs are processed by the
agent.pyscript. These inputs are used directly in network operations (raw socket writes and HTTP requests) across theidentify_architectureandrun_assessmentfunctions. The absence of strict input sanitization on the URL beyond basic parsing creates a surface for potential exploitation if the agent is directed toward malicious or internal targets. - [METADATA_POISONING]: There is a discrepancy in the skill's attribution, as the YAML frontmatter identifies the author as 'mahipal' while the LICENSE file attributes the work to 'mukul975'.
Audit Metadata