binary-exploitation-tools

Fail

Audited by Gen Agent Trust Hub on May 9, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The skill contains a command for installing the GDB Enhanced Features (GEF) plugin by piping a remote shell script directly into bash (bash -c "$(curl -fsSL https://gef.blah.cat/sh)"). This pattern appears in both SKILL.md and references/binary-tools-reference.md and represents a risk if the remote source is compromised.
  • [COMMAND_EXECUTION]: The skill provides numerous CLI commands for system interaction, including process attachment (gdb -p <pid>), system call tracing (strace), and binary compilation (gcc). These are standard tools for binary analysis but allow for significant system-level interaction.
  • [EXTERNAL_DOWNLOADS]: The skill includes instructions to download external tools and resources, such as cloning the pwndbg repository from GitHub and fetching shellcode samples via GEF commands (shellcode get 61).
Recommendations
  • HIGH: Downloads and executes remote code from: https://gef.blah.cat/sh - DO NOT USE without thorough review
Audit Metadata
Risk Level
HIGH
Analyzed
May 9, 2026, 08:27 AM