aws-cli
Fail
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- CREDENTIALS_UNSAFE (HIGH): The script
scripts/aws-profile-manager.shcontains a functionshow_profile_infothat usesawkto extract and print the raw contents of the user's AWS credentials file (~/.aws/credentials). This exposes sensitiveaws_access_key_idandaws_secret_access_keyto the agent's context and logs. - Persistence Mechanisms (HIGH): The script
scripts/aws-profile-manager.shincludes a functionset_default_profilethat appends export commands to~/.bashrcand~/.zshrc. This modifies the user's environment permanently across sessions. - External Downloads (LOW):
references/AWS-CLI-BEST-PRACTICES.mdcontains instructions to download the AWS CLI v2 fromawscli.amazonaws.com. While the installation usessudo, the source is a trusted official provider. - Indirect Prompt Injection (LOW): The skill is designed to interact with AWS logs and resources. Ingestion points: Where untrusted data enters agent context (
aws logs tailandaws logs filter-log-events). Boundary markers: Delimiters or 'ignore embedded instructions' warnings are absent. Capability inventory: Full AWS CLI access and shell script execution across multiple scripts. Sanitization: Escaping or validation of log content is absent, creating a surface where malicious log entries could influence the agent's subsequent actions.
Recommendations
- AI detected serious security threats
Audit Metadata