intercepting-mobile-traffic-with-burpsuite

Pass

Audited by Gen Agent Trust Hub on Apr 17, 2026

Risk Level: SAFE
Full Analysis
  • [SAFE]: The skill contains technical documentation and scripts for mobile penetration testing. The scripts in scripts/agent.py and scripts/process.py are purely analytical tools used to parse HTTP archives (HAR) and Burp Suite XML exports for insecure configurations and sensitive data patterns.
  • [DATA_EXFILTRATION]: No unauthorized network operations or exfiltration patterns were found. The scripts process local files and do not communicate with external servers.
  • [REMOTE_CODE_EXECUTION]: There is no usage of dangerous functions such as eval, exec, or subprocess calls that could lead to code execution. The scripts use standard library modules for string processing and data parsing.
  • [PROMPT_INJECTION]: The skill does not contain instructions that attempt to override agent behavior or bypass safety filters. The analytical scripts process external data (HAR/XML), but their capabilities are limited to pattern matching (regex) and structural mapping, presenting a minimal risk surface for indirect injection.
  • [COMMAND_EXECUTION]: The skill's documentation includes command-line examples for tools like Frida, Objection, and ADB. These are intended for the user to execute manually in a testing environment and are not automated by the skill in a way that could compromise the host system.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 17, 2026, 06:43 PM