nginx-configuration

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • COMMAND_EXECUTION (LOW): The skill includes a bash deployment script (nginx-deploy.sh) that executes privileged system commands such as systemctl reload, systemctl start, and nginx -t. While these are standard for Nginx administration, they grant the agent significant control over system services.
  • PROMPT_INJECTION (LOW): Identified an Indirect Prompt Injection surface (Category 8) due to log monitoring capabilities.
  • Ingestion points: The skill references reading and monitoring Nginx access logs (/var/log/nginx/access.log) and system logs via journalctl -u nginx.
  • Boundary markers: No boundary markers or 'ignore' instructions are provided to separate log data from agent instructions.
  • Capability inventory: The skill possesses the ability to manage system services (systemctl), modify configurations, and perform local network requests (curl).
  • Sanitization: No sanitization or filtering of log data (which contains user-controlled strings like User-Agents or URIs) is implemented.
  • DATA_EXPOSURE (SAFE): The configuration templates reference sensitive paths such as /etc/ssl/private/myapp.com.key. In the context of an Nginx configuration skill, this is standard practice for SSL/TLS setup and does not constitute a malicious exposure or exfiltration attempt.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 04:52 PM