prometheus-grafana
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION] (LOW): Detected a potential indirect prompt injection surface (Category 8) where untrusted data from a Prometheus server is ingested by the agent. An attacker could potentially influence the agent's behavior by crafting malicious metric labels or alert annotations that the agent then processes as part of a health check.
- Ingestion points:
scripts/prometheus-health-check.sh(lines 33, 44, 53, 62) reads metric labels and alert annotations from various Prometheus API endpoints. - Boundary markers: Absent; the script outputs raw text results without delimiters or instructions for the agent to ignore embedded commands.
- Capability inventory: The skill contains scripts (
scripts/backup-grafana.sh,scripts/prometheus-health-check.sh) that usecurlfor network access and handle authentication credentials. - Sanitization: Absent; the data is extracted via
jqand printed directly without filtering for instructional keywords. - [DATA_EXPOSURE] (SAFE): The
assets/prometheus-config.yamlfile references standard Kubernetes service account token paths (/var/run/secrets/kubernetes.io/serviceaccount/token). This is the expected and documented configuration for Kubernetes monitoring and does not indicate a security violation. - [COMMAND_EXECUTION] (SAFE): Bash scripts use standard tools such as
curlandjqfor legitimate administrative tasks. No evidence of unauthorized command injection or suspicious subprocess spawning was found.
Audit Metadata