nginx-configuration
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (LOW): The skill includes a bash deployment script (
nginx-deploy.sh) that executes privileged system commands such assystemctl reload,systemctl start, andnginx -t. While these are standard for Nginx administration, they grant the agent significant control over system services. - PROMPT_INJECTION (LOW): Identified an Indirect Prompt Injection surface (Category 8) due to log monitoring capabilities.
- Ingestion points: The skill references reading and monitoring Nginx access logs (
/var/log/nginx/access.log) and system logs viajournalctl -u nginx. - Boundary markers: No boundary markers or 'ignore' instructions are provided to separate log data from agent instructions.
- Capability inventory: The skill possesses the ability to manage system services (
systemctl), modify configurations, and perform local network requests (curl). - Sanitization: No sanitization or filtering of log data (which contains user-controlled strings like User-Agents or URIs) is implemented.
- DATA_EXPOSURE (SAFE): The configuration templates reference sensitive paths such as
/etc/ssl/private/myapp.com.key. In the context of an Nginx configuration skill, this is standard practice for SSL/TLS setup and does not constitute a malicious exposure or exfiltration attempt.
Audit Metadata