sls-trace-analyzer
Pass
Audited by Gen Agent Trust Hub on Apr 14, 2026
Risk Level: SAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [DATA_EXFILTRATION]: The skill accesses sensitive local files including cloud credentials at
~/.config/sls-query/credentials.jsonand local source code located within~/IdeaProjects/. This access is necessary for its stated purpose of log querying and code analysis. - [COMMAND_EXECUTION]: The skill executes shell commands to manage its environment and navigate codebases, including
python,pip, andgitcommands (e.g.,git checkout,git pull). - [EXTERNAL_DOWNLOADS]: The script
sls-query.pymakes network requests to Alibaba Cloud SLS endpoints (*.log.aliyuncs.com) to retrieve log data. This targets a well-known cloud service provider. - [INDIRECT_PROMPT_INJECTION]: The skill processes external log data which could potentially contain malicious instructions intended to manipulate the agent's behavior.
- Ingestion points: Log data returned by the
sls-query.pyscript from Alibaba Cloud SLS. - Boundary markers: None identified; log content is directly provided to the agent for analysis.
- Capability inventory: The agent can read local files, execute shell commands (git, python), and perform network operations.
- Sanitization: No specific sanitization or filtering of log content is implemented before analysis.
Audit Metadata