aws-cli

Fail

Audited by Gen Agent Trust Hub on Apr 14, 2026

Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [DATA_EXFILTRATION]: The script scripts/aws-profile-manager.sh directly reads and displays the content of ~/.aws/credentials. This exposes sensitive AWS Access Key IDs and Secret Access Keys to the terminal output and potentially the agent's logs or context.
  • [COMMAND_EXECUTION]: The script scripts/aws-profile-manager.sh attempts to achieve persistence by appending environment variable exports (AWS_PROFILE) to user shell profile files including ~/.bashrc and ~/.zshrc.
  • [EXTERNAL_DOWNLOADS]: The documentation in references/AWS-CLI-BEST-PRACTICES.md provides instructions to download the AWS CLI installation zip from official Amazon Web Services domains (awscli.amazonaws.com).
  • [COMMAND_EXECUTION]: The skill facilitates the execution of powerful AWS CLI commands, including aws ecs execute-command for interactive shell access in containers and various resource deletion commands (aws s3 rm, aws ec2 terminate-instances).
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Apr 14, 2026, 01:22 AM