ethical-hacking-methodology
skills-sh:sickn33_antigravity-awesome-skills__ethical-hacking-methodology
View sourceFirst Seen
Feb 18, 2026
Last Scanned
Feb 20, 2026
Findings
3
Score
92/100
Findings (3)
Detects reads of sensitive system or credential files
cat /etc/passwd Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.
Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.
Detects cron jobs or scheduled tasks that execute commands
echo "* * * * * /tmp/backdoor.sh" >> /etc/crontab Validate cron expressions and scheduled commands against an allowlist. Ensure scheduled tasks cannot be modified by untrusted input and log all cron job changes.
Likely FP if the match is a documentation reference to crontab syntax or a short mention of cron in a description of scheduling concepts.
Detects execution of shell script files via bash/sh command or direct invocation
sh
linux-exploit-suggester.sh Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.
Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.