catc-inventory

Warn

Audited by Gen Agent Trust Hub on Mar 18, 2026

Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [CREDENTIALS_UNSAFE]: The skill instructs the agent to execute commands using the pattern CCC_PWD=$CCC_PWD python3 -u $CATC_MCP_SCRIPT. Passing passwords as environment variables on the command line is insecure as they may be visible in process listings or system logs.
  • [COMMAND_EXECUTION]: The skill's core functionality relies on the execution of shell commands through a custom $MCP_CALL wrapper. It dynamically constructs these commands using several environment variables ($CATC_MCP_SCRIPT, $MCP_CALL), making the execution flow dependent on external environment configuration.
  • [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. Ingestion points: Network device data (hostnames, serial numbers, platform IDs, location names) and site hierarchies are fetched from the Catalyst Center API via fetch_devices and fetch_sites. Boundary markers: The instructions lack specific delimiters or "ignore embedded instructions" directives when processing or reporting this data. Capability inventory: The skill can execute Python scripts ($CATC_MCP_SCRIPT, $PYATS_MCP_SCRIPT) and record activities via $GAIT_MCP_SCRIPT. Sanitization: There is no evidence of sanitization or validation of the strings retrieved from the network controller before they are included in generated reports or GAIT records.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 18, 2026, 06:12 AM