gtrace-ip-enrichment
Pass
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes system commands by calling
python3 $MCP_CALLto run thegtrace mcputility. This allows the agent to perform network-related lookups such as ASN ownership, Geolocation, and Reverse DNS resolution. - [PROMPT_INJECTION]: Indirect prompt injection attack surface identified.
- Ingestion points: Data enters the agent context through the
ipparameter in theasn_lookup,geo_lookup, andreverse_dnstools, typically sourced from external network logs, traceroute hops, or user input (SKILL.md). - Boundary markers: Absent; the instructions do not specify the use of delimiters or 'ignore instructions' warnings for the processed IP strings.
- Capability inventory: The skill is capable of executing subprocesses through the
gtracebinary using the$MCP_CALLenvironment variable (SKILL.md). - Sanitization: Absent; the skill does not explicitly define validation or sanitization steps for the IP address input before it is interpolated into the command parameters.
Audit Metadata