application-logging
Pass
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: Indirect prompt injection surface identified in logging reference guides.
- Ingestion points:
references/flask-integration.mdlogs theX-Request-IDheader andorder_idURL parameter;references/express-http-request-logging.mdlogsx-request-idanduserIdfrom request headers and parameters. - Boundary markers: Absent; untrusted external data is interpolated directly into log fields without delimiters or "ignore" instructions.
- Capability inventory: The skill's primary function is to create logs. If these logs are later consumed or analyzed by an AI agent, they provide a vector for indirect instruction injection.
- Sanitization: Absent; the examples show direct use of request-derived strings without validation or escaping.
- [COMMAND_EXECUTION]: Security anti-pattern in reference code logic.
references/flask-integration.mdincludes a code example for a database query that is vulnerable to SQL injection:db.query(f'SELECT * FROM orders WHERE id = {order_id}')uses an unparameterized f-string with a URL-derived variable.- [EXTERNAL_DOWNLOADS]: Fetches configuration and images from a well-known service.
references/elk-stack-setup.mdcontains a Docker Compose configuration that pulls official Elasticsearch, Logstash, and Kibana images fromdocker.elastic.co(Elastic's official registry).
Audit Metadata