pyats-f5-ltm
Pass
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes pyATS commands via a Python wrapper script. This functionality is essential for its primary purpose of network auditing and uses system-defined environment variables for execution.
- [PROMPT_INJECTION]: The skill retrieves configuration data from F5 devices, which serves as an indirect prompt injection surface. * Ingestion points: iControl REST API responses from F5 devices (e.g., LTM rules and virtual server metadata). * Boundary markers: No explicit delimiters are used to separate device data from agent instructions. * Capability inventory: Subprocess calls to execute pyATS commands. * Sanitization: Data from devices is processed without specific filtering or sanitization.
Audit Metadata