itential-automation
Pass
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFEREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides tools like
run_command, which enables the execution of CLI commands on network devices, andrun_service, which executes gateway services and returns system output (stdout/stderr). - [EXTERNAL_DOWNLOADS]: The skill references the
itential-mcppackage and resources from the Itential GitHub organization (itential/itential-mcp) and container registry (ghcr.io/itential/itential-mcp). As Itential is a recognized provider for these services, these are documented as standard external dependencies. - [CREDENTIALS_UNSAFE]: The skill requires the
ITENTIAL_MCP_PLATFORM_PASSWORDenvironment variable to be set for platform authentication. - [REMOTE_CODE_EXECUTION]: The
render_templatetool performs dynamic Jinja2 template rendering. If user-supplied variables are not properly sanitized, this could potentially lead to template injection vulnerabilities. - [PROMPT_INJECTION]: The skill has an attack surface for indirect prompt injection. * Ingestion points: The agent ingests external data from the platform, including device configurations (
get_device_configuration), compliance reports (describe_compliance_report), and OpenAPI specifications (create_integration_model). * Boundary markers: No specific delimiters or instructions to ignore embedded commands are present in the skill's workflows. * Capability inventory: The agent has access to high-privilege tools such asrun_command,apply_device_configuration, andrun_service. * Sanitization: There is no explicit mention of data validation or sanitization for content retrieved from the Itential platform before it is processed by the agent.
Audit Metadata