testing-for-email-header-injection

Pass

Audited by Gen Agent Trust Hub on Apr 9, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
  • [COMMAND_EXECUTION]: The script scripts/agent.py performs automated HTTP POST requests to a target URL provided by the user to probe for vulnerabilities. This behavior is consistent with the skill's stated purpose as a security testing tool.\n- [EXTERNAL_DOWNLOADS]: The skill requires the requests library to handle network communication with target servers during security assessments.\n- [DATA_EXFILTRATION]: The tool transmits test payloads to external network endpoints. This operation is directed by the user through the provision of a target URL and is used to validate the presence of header injection vulnerabilities.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 9, 2026, 06:48 PM