upload-insecure-files
Fail
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill provides functional exploit payloads for achieving remote code execution across multiple platforms. This includes ImageMagick 'ImageTragick' (CVE-2016-3714) payloads using MVG and SVG delegates, Ghostscript sandbox escapes via PostScript, and Tomcat CVE-2017-12615 exploitation using JSP webshells.\n- [DATA_EXFILTRATION]: Functional payloads for FFmpeg-based Local File Read (LFD) and SSRF are provided in
SKILL.md. These utilize theconcatprotocol andfile:///URIs to read sensitive local files such as/etc/passwdand exfiltrate their contents to attacker-controlled servers or embed them in output files.\n- [COMMAND_EXECUTION]: The playbook contains multiple webshell templates for PHP, JSP, and ASP (e.g.,system($_GET[\"cmd\"])andRuntime.getRuntime().exec()) and demonstrates how to chain file uploads into arbitrary system command execution.\n- [EXTERNAL_DOWNLOADS]: The skill instructs the agent on how to use network tools likecurlandwgetto interact with external servers during the exploitation process, including PUT-based uploads, COPY/MOVE method exploitation, and fetching external malicious payloads.
Recommendations
- CRITICAL: 2 infected file(s) detected - DO NOT USE
- AI detected serious security threats
Audit Metadata