ethical-hacking-methodology

skills-sh:sickn33_antigravity-awesome-skills__ethical-hacking-methodology

View source
A
92/100

First Seen

Feb 18, 2026

Last Scanned

Feb 20, 2026

Findings

3

Score

92/100

MEDIUM 1
LOW 2

Findings (3)

MEDIUM
Sensitive file read pattern
L269

Detects reads of sensitive system or credential files

cat /etc/passwd
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

LOW
Cron or scheduled command execution
L285

Detects cron jobs or scheduled tasks that execute commands

echo "* * * * * /tmp/backdoor.sh" >> /etc/crontab
FIX

Validate cron expressions and scheduled commands against an allowlist. Ensure scheduled tasks cannot be modified by untrusted input and log all cron job changes.

FP?

Likely FP if the match is a documentation reference to crontab syntax or a short mention of cron in a description of scheduling concepts.

LOW
Shell script file execution
L291

Detects execution of shell script files via bash/sh command or direct invocation

sh
linux-exploit-suggester.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.