waf-bypass-methodology
Fail
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The file
references/parameter-bypass.mdcontains a functional PHP web shell (<?php system($_GET['cmd']); ?>) used for executing arbitrary commands on a server. This file was explicitly flagged by an automated antivirus scan as malware. - [COMMAND_EXECUTION]: The skill provides command templates using
curlto fingerprint and bypass security controls on remote targets. These patterns enable the agent to perform network-based scanning and exploitation. - [DATA_EXFILTRATION]: The skill describes techniques like HTTP Request Smuggling and specific Content-Type manipulations that facilitate sending arbitrary data to remote servers, potentially bypassing outbound traffic monitoring.
- [PROMPT_INJECTION]: The shell command templates interpolate a user-defined
TARGETvariable without any input validation or sanitization, creating a surface where a malicious actor could inject secondary shell commands or modify the intended network operation.
Recommendations
- CRITICAL: 1 infected file(s) detected - DO NOT USE
- AI detected serious security threats
Audit Metadata