webshell-management
Fail
Audited by Gen Agent Trust Hub on Apr 22, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill contains multiple templates for executing arbitrary shell commands on a remote server via
curl. These include interactive reverse shell payloads using Bash and Python, which provide persistent access to a target machine. - [REMOTE_CODE_EXECUTION]: It provides specific instructions and code snippets for interacting with PHP
eval()andsystem()backdoors. This includes sophisticated scripts for encrypted communication using XOR and AES-128-CBC to bypass network-based intrusion detection systems (IDS). - [DATA_EXFILTRATION]: The skill guides the user through identifying and extracting sensitive information. Evidence includes commands to read
/etc/passwd, search for.envfiles, and exfiltrate database configuration files via Base64 encoding. - [CREDENTIALS_UNSAFE]: Includes commands designed specifically to harvest database credentials by searching the target filesystem for PHP code containing database connection strings (
mysql_connect,mysqli,PDO). - [PERSISTENCE]: Provides instructions for maintaining long-term access to a system through malicious
cronjobs, manipulating file timestamps (touch -r) to hide backdoors, and abusing.htaccessfiles to treat image files as executable PHP code.
Recommendations
- AI detected serious security threats
Audit Metadata