binary-exploitation-tools
Fail
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill contains a command for installing the GDB Enhanced Features (GEF) plugin by piping a remote shell script directly into bash (
bash -c "$(curl -fsSL https://gef.blah.cat/sh)"). This pattern appears in bothSKILL.mdandreferences/binary-tools-reference.mdand represents a risk if the remote source is compromised. - [COMMAND_EXECUTION]: The skill provides numerous CLI commands for system interaction, including process attachment (
gdb -p <pid>), system call tracing (strace), and binary compilation (gcc). These are standard tools for binary analysis but allow for significant system-level interaction. - [EXTERNAL_DOWNLOADS]: The skill includes instructions to download external tools and resources, such as cloning the
pwndbgrepository from GitHub and fetching shellcode samples via GEF commands (shellcode get 61).
Recommendations
- HIGH: Downloads and executes remote code from: https://gef.blah.cat/sh - DO NOT USE without thorough review
Audit Metadata