skills/mukul975/anthropic-cybersecurity-skills/performing-mobile-app-certificate-pinning-bypass/Gen Agent Trust Hub
performing-mobile-app-certificate-pinning-bypass
Pass
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes the
subprocessmodule to interface with external command-line utilities for security analysis. - In
scripts/agent.py, the script executesapktoolfor static analysis of APK files andadbto verify device proxy and certificate configurations. - In
scripts/process.py, it executesfridato initiate dynamic instrumentation sessions. - Commands are constructed using argument lists, which mitigates standard shell injection vulnerabilities.
- [REMOTE_CODE_EXECUTION]: The skill facilitates the injection of JavaScript code into target mobile application processes using the Frida framework.
- The Python scripts include hardcoded JavaScript snippets for bypassing common SSL/TLS pinning implementations like OkHttp, TrustManager, and NSURLSession.
- These scripts are written to local storage in the
/tmp/directory before being loaded into the target process memory. - [EXTERNAL_DOWNLOADS]: The documentation references standard security tools that must be installed from official registries.
- It provides instructions to install
frida-toolsandobjectionviapip. These are well-known tools from trusted sources and are essential for the skill's documented workflow.
Audit Metadata