ssh-penetration-testing

skills-sh:sickn33_antigravity-awesome-skills__ssh-penetration-testing

View source
C
68/100

First Seen

Feb 18, 2026

Last Scanned

Feb 20, 2026

Findings

11

Score

68/100

MEDIUM 4
LOW 7

Findings (11)

MEDIUM
Sensitive file read pattern
L310

Detects reads of sensitive system or credential files

cat ~/.ssh
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

MEDIUM
Read sensitive files and transmit externally
L310

Detects skills that both read sensitive credential files and send data to external services

cat ~/.ssh + Forward local port to remote
FIX

Block access to git credentials, SSH keys, and repository tokens. If git operations are needed, use scoped deploy keys and restrict the tool to specific repositories.

FP?

Likely FP if the match is documentation about git configuration (e.g., setting up git credentials helper) rather than code that reads and transmits them.

MEDIUM
Sensitive file read pattern
L311

Detects reads of sensitive system or credential files

cat ~/.ssh
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

MEDIUM
Sensitive file read pattern
L320

Detects reads of sensitive system or credential files

cat /etc/passwd
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

LOW
Download binary or archive from URL
L195

Detects downloading binary, archive, or installer files from remote URLs

curl -s http://target.com/backup/ssh_keys.tar.gz
FIX

Verify the integrity of downloaded binaries or archives using SHA-256 checksums or GPG signatures. Pin download URLs to specific versions and avoid fetching from unverified sources.

FP?

Likely FP if the download is from github.com or githubusercontent.com for a specific tagged release with documented checksums.

LOW
Agent shell tool usage
L353

Detects skills instructing agents to use Bash/shell tools for command execution

execute_command(
FIX

Restrict the shell tool to specific allowlisted commands using a command prefix or regex filter. Avoid granting broad shell access in agent tool definitions.

FP?

Likely FP if the skill is a development environment tool where shell access is the intended and documented core feature.

LOW
MCP code execution tool
L353

Detects MCP tools that execute arbitrary code

execute_command
FIX

Restrict code execution tools to specific languages and sandbox the runtime environment. Use a container or VM-based sandbox instead of running code directly on the host.

FP?

Likely FP if the MCP tool is a dedicated code runner (e.g., Jupyter kernel) with documented sandboxing and no network access.

LOW
MCP code execution tool
L369

Detects MCP tools that execute arbitrary code

execute_command
FIX

Restrict code execution tools to specific languages and sandbox the runtime environment. Use a container or VM-based sandbox instead of running code directly on the host.

FP?

Likely FP if the MCP tool is a dedicated code runner (e.g., Jupyter kernel) with documented sandboxing and no network access.

LOW
Agent shell tool usage
L369

Detects skills instructing agents to use Bash/shell tools for command execution

execute_command(
FIX

Restrict the shell tool to specific allowlisted commands using a command prefix or regex filter. Avoid granting broad shell access in agent tool definitions.

FP?

Likely FP if the skill is a development environment tool where shell access is the intended and documented core feature.

LOW
MCP code execution tool
L383

Detects MCP tools that execute arbitrary code

execute_command
FIX

Restrict code execution tools to specific languages and sandbox the runtime environment. Use a container or VM-based sandbox instead of running code directly on the host.

FP?

Likely FP if the MCP tool is a dedicated code runner (e.g., Jupyter kernel) with documented sandboxing and no network access.

LOW
Agent shell tool usage
L383

Detects skills instructing agents to use Bash/shell tools for command execution

execute_command(
FIX

Restrict the shell tool to specific allowlisted commands using a command prefix or regex filter. Avoid granting broad shell access in agent tool definitions.

FP?

Likely FP if the skill is a development environment tool where shell access is the intended and documented core feature.