skills/mukul975/anthropic-cybersecurity-skills/exploiting-vulnerabilities-with-metasploit-framework/Gen Agent Trust Hub
exploiting-vulnerabilities-with-metasploit-framework
Pass
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/agent.pyscript executesnmapandmsfconsoleusing thesubprocessmodule to perform scanning and module searches as part of its intended functionality. - [COMMAND_EXECUTION]: The
SKILL.mdinstructions include commands usingsudofor system service management, such as starting the PostgreSQL database and initializing the Metasploit database. - [PROMPT_INJECTION]: The skill's ingestion of external scan results from Nessus files and CSV reports creates a surface for potential indirect prompt injection attacks. Evidence: 1. Ingestion:
db_importinSKILL.mdandpd.read_csvinscripts/process.py. 2. Boundary markers: Absent. 3. Capability inventory:subprocesscalls and Metasploit RPC execution. 4. Sanitization: Absent. - [COMMAND_EXECUTION]: The agent dynamically generates and executes Metasploit resource scripts (
.rc) based on user input to automate command sequences inmsfconsole. - [REMOTE_CODE_EXECUTION]: The skill facilitates remote code execution against target systems using Metasploit modules for the purpose of validating identified vulnerabilities.
- [EXTERNAL_DOWNLOADS]: The
scripts/process.pyscript disables SSL certificate verification (verify=False) when connecting to the Metasploit RPC API, which is a common practice in controlled testing environments but avoids standard security validation.
Audit Metadata