Skip to main content

perseus-injection

Performs deep injection vulnerability analysis across various languages and frameworks to identify and mitigate security risks.

Install this skill

or
0/100

Security score

The perseus-injection skill was audited on Mar 1, 2026 and we found 30 security issues across 1 threat category, including 14 high-severity. Review the findings below before installing.

Categories Tested

Security Issues

high line 215

Direct command execution function call

SourceSKILL.md
215// RCE: <%= process.mainModule.require('child_process').execSync('id') %>
high line 251

Direct command execution function call

SourceSKILL.md
251exec(`ls ${userInput}`);
high line 252

Direct command execution function call

SourceSKILL.md
252execSync(`git clone ${url}`);
high line 253

Direct command execution function call

SourceSKILL.md
253spawn('sh', ['-c', cmd]);
high line 281

Direct command execution function call

SourceSKILL.md
281Runtime.getRuntime().exec(cmd);
high line 289

Direct command execution function call

SourceSKILL.md
289exec(cmd)
high line 315

Direct command execution function call

SourceSKILL.md
315// RCE: T(java.lang.Runtime).getRuntime().exec('id')
high line 319

Direct command execution function call

SourceSKILL.md
319// RCE: (#[email protected]@getRuntime(),#rt.exec('id'))
high line 116

Eval function call - arbitrary code execution

SourceSKILL.md
116redis.eval(`return redis.call('get', '${userInput}')`, 0);
high line 120

Eval function call - arbitrary code execution

SourceSKILL.md
120rdb.Eval(ctx, script, []string{userKey})
high line 124

Eval function call - arbitrary code execution

SourceSKILL.md
124r.eval(f"return redis.call('get', '{key}')", 0)
medium line 116

Template literal with variable interpolation in command context

SourceSKILL.md
116redis.eval(`return redis.call('get', '${userInput}')`, 0);
medium line 175

Template literal with variable interpolation in command context

SourceSKILL.md
175```python
medium line 193

Template literal with variable interpolation in command context

SourceSKILL.md
193```java
medium line 251

Template literal with variable interpolation in command context

SourceSKILL.md
251exec(`ls ${userInput}`);
medium line 252

Template literal with variable interpolation in command context

SourceSKILL.md
252execSync(`git clone ${url}`);
medium line 311

Template literal with variable interpolation in command context

SourceSKILL.md
311```java
medium line 334

Template literal with variable interpolation in command context

SourceSKILL.md
334```java
medium line 346

Template literal with variable interpolation in command context

SourceSKILL.md
346console.log(`User logged in: ${username}`);
medium line 419

Template literal with variable interpolation in command context

SourceSKILL.md
419```javascript
high line 548

Template literal with variable interpolation in command context

SourceSKILL.md
548| SSTI (Freemarker) | `${7*7}` | Output: 49 |
high line 551

Template literal with variable interpolation in command context

SourceSKILL.md
551| SpEL | `${7*7}` | Output: 49 |
high line 553

Template literal with variable interpolation in command context

SourceSKILL.md
553| Log4j | `${jndi:ldap://x.x}` | DNS callback |
medium line 262

System command execution

SourceSKILL.md
262system($cmd);
medium line 270

System command execution

SourceSKILL.md
270os.system(cmd)
medium line 286

System command execution

SourceSKILL.md
286system(cmd)
low line 215

Node child_process module reference

SourceSKILL.md
215// RCE: <%= process.mainModule.require('child_process').execSync('id') %>
medium line 270

Python os.system command execution

SourceSKILL.md
270os.system(cmd)
medium line 271

Python subprocess execution

SourceSKILL.md
271subprocess.call(cmd, shell=True)
medium line 272

Python subprocess execution

SourceSKILL.md
272subprocess.Popen(cmd, shell=True)
Scanned on Mar 1, 2026
View Security Dashboard