ansible
Pass
Audited by Gen Agent Trust Hub on Apr 14, 2026
Risk Level: SAFECOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill demonstrates the use of the
ansibleCLI and modules likecommandandshellto perform operations on managed hosts, which allows for arbitrary execution as part of the tool's intended automation purpose.- [CREDENTIALS_UNSAFE]: Examples include configurations that reference sensitive file paths for authentication, such as SSH private keys (~/.ssh/deploy_key) and Ansible Vault password files (~/.vault_pass).- [EXTERNAL_DOWNLOADS]: The skill documents methods to fetch external content usingansible-galaxyfor roles and collections,gitfor repository cloning, andget_urlfor downloading files from external URLs likehttps://example.com/app.tar.gz.- [DATA_EXFILTRATION]: Provides patterns for reading sensitive system files (e.g.,cat /etc/passwd) and gathering extensive host facts via thesetupmodule, which are common administrative tasks but involve accessing system metadata.- [PROMPT_INJECTION]: The agent processes untrusted input from inventory files, external variables, and Jinja2 templates, creating a surface for indirect prompt injection. - Ingestion points: Inventory files (
hosts.ini), group and host variable files (group_vars/), and CLI-supplied extra variables (-e). - Boundary markers: Absent in the provided code examples.
- Capability inventory: Includes full system execution and file modification via modules like
apt,file,systemd, andshell. - Sanitization: No explicit validation or escaping of external content is shown in the examples.
Audit Metadata