401-403-bypass
Warn
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides specific shell commands for the agent to execute, referring to scripts (
byp4xx.sh,403bypasser.py) that are not part of the skill's file set. Evidence found inreferences/middleware-combo-bypass.md. - [EXTERNAL_DOWNLOADS]: The skill promotes the use of third-party scanning tools such as
byp4xxand403bypasser. This creates a dependency on external code that is not verified, authenticated, or pinned to a specific source within the skill. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it ingests and processes data from untrusted external endpoints. An attacker controlling a target server could return malicious instructions designed to exploit the agent's command execution capabilities.
- Ingestion points: Target URLs and response headers (referenced in
SKILL.mdand all files inreferences/). - Boundary markers: Absent. No instructions are provided to the agent to distinguish between valid data and potential instructions in server responses.
- Capability inventory: Shell execution (subprocess) via referenced scripts and potential network operations.
- Sanitization: Absent. There is no mention of escaping or validating content retrieved from target servers before it enters the agent context.
Audit Metadata