upload-insecure-files

Fail

Audited by Gen Agent Trust Hub on Apr 30, 2026

Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The skill provides functional exploit payloads for achieving remote code execution across multiple platforms. This includes ImageMagick 'ImageTragick' (CVE-2016-3714) payloads using MVG and SVG delegates, Ghostscript sandbox escapes via PostScript, and Tomcat CVE-2017-12615 exploitation using JSP webshells.\n- [DATA_EXFILTRATION]: Functional payloads for FFmpeg-based Local File Read (LFD) and SSRF are provided in SKILL.md. These utilize the concat protocol and file:/// URIs to read sensitive local files such as /etc/passwd and exfiltrate their contents to attacker-controlled servers or embed them in output files.\n- [COMMAND_EXECUTION]: The playbook contains multiple webshell templates for PHP, JSP, and ASP (e.g., system($_GET[\"cmd\"]) and Runtime.getRuntime().exec()) and demonstrates how to chain file uploads into arbitrary system command execution.\n- [EXTERNAL_DOWNLOADS]: The skill instructs the agent on how to use network tools like curl and wget to interact with external servers during the exploitation process, including PUT-based uploads, COPY/MOVE method exploitation, and fetching external malicious payloads.
Recommendations
  • CRITICAL: 2 infected file(s) detected - DO NOT USE
  • AI detected serious security threats
Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 30, 2026, 12:02 PM