java-xxe-audit
Fail
Audited by Gen Agent Trust Hub on Apr 11, 2026
Risk Level: CRITICALEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The file
references/DECOMPILE_STRATEGY.mdincludes instructions to download an executable JAR file (cfr-0.152.jar) fromhttps://xget.xi-xu.me/gh/leibnitz27/cfr/releases/download/0.152/cfr-0.152.jar. This third-party domain is not a trusted source and has been explicitly flagged as malicious by automated security scanners. - [REMOTE_CODE_EXECUTION]: The skill executes the downloaded binary file using
java -jarwithinreferences/DECOMPILE_STRATEGY.md. Running binaries from unverified, non-trusted, and flagged domains creates a significant risk of remote code execution. - [COMMAND_EXECUTION]: The skill uses several shell commands, such as
grep,find, andcurl, to scan source code and download external components. - [PROMPT_INJECTION]: The skill is vulnerable to Indirect Prompt Injection (Category 8) because it processes untrusted input while having high-privilege capabilities.
- Ingestion points: The skill reads project source code, compiled
.classfiles, and.jararchives as specified inSKILL.mdandreferences/DECOMPILE_STRATEGY.md. - Boundary markers: Absent; there are no instructions to use delimiters or ignore potentially malicious prompts embedded within the files being audited.
- Capability inventory: The skill can execute shell commands (
grep,find,curl) and run external Java binaries (java -jar) as documented inSKILL.mdandreferences/DECOMPILE_STRATEGY.md. - Sanitization: No sanitization or validation of the input source code or byte code is performed before analysis.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata