troubleshooting
Fail
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill instructions facilitate the retrieval of administrative credentials by reading the root API key from
/opt/ludus/install/root-api-key. - [COMMAND_EXECUTION]: The troubleshooting guide includes several high-risk commands and scripts:
- Destructive file operations including recursive deletion (
rm -rf /opt/ludus) and automated deletion viafindwith the-deleteflag. - System-level configuration changes involving
systemctl,iptables,ifup, andupdate-ca-certificates. - Execution within a modified root environment via
chrootfor GRUB repair procedures. - [EXTERNAL_DOWNLOADS]: The skill references and instructs the user to download assets from the vendor's GitLab repository (
gitlab.com/badsectorlabs/ludus.git) and official documentation domains (docs.ludus.cloud). - [PROMPT_INJECTION]: The skill is designed to ingest and analyze untrusted data sources which could lead to command manipulation.
- Ingestion points: Analyzes deployment logs, error messages, and range configurations provided by the user or system.
- Boundary markers: None identified in the provided instructions to separate data from commands.
- Capability inventory: Extensive shell execution capabilities including system service control, firewall modification, and file system management across multiple scripts.
- Sanitization: There is no evidence of sanitization or filtering applied to the ingested log or error data.
Recommendations
- AI detected serious security threats
Audit Metadata