pyats-linux-system
Pass
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Provides functionality to execute arbitrary shell commands on remote Linux hosts via the
pyats_run_linux_commandtool, which is a powerful administrative primitive. - [PROMPT_INJECTION]: The skill relies on natural language instructions to restrict actions to read-only operations. These guardrails are not technically enforced and are susceptible to prompt injection or behavioral overrides.
- [DATA_EXFILTRATION]: Facilitates inspection of sensitive system paths such as
/etc,/var/log, and/homefor diagnostic purposes, creating a potential surface for sensitive data exposure. - [PROMPT_INJECTION]: Vulnerable to indirect prompt injection due to the lack of technical boundaries around command execution. Ingestion points:
commandparameter inpyats_run_linux_command(SKILL.md). Boundary markers: Missing technical delimiters. Capability inventory: Remote command execution and filesystem access (SKILL.md). Sanitization: None programmatically implemented.
Audit Metadata