skills/boshu2/agentops/security-suite/Gen Agent Trust Hub

security-suite

Warn

Audited by Gen Agent Trust Hub on Mar 14, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The scripts/security_suite.py script executes target binaries provided by the user to perform dynamic analysis. Although it uses list-based arguments with subprocess.Popen to avoid shell injection, the binary itself is executed with the system privileges of the agent. The "sandbox" implementation is minimal, relying on environment variable redirection for HOME and TMPDIR and does not provide strong isolation, resource limits, or kernel-level restrictions (like namespaces or cgroups) to prevent a malicious binary from affecting the host system.
  • [PROMPT_INJECTION]: The skill processes untrusted external data in the form of binary files and repository source code, creating a surface for indirect prompt injection attacks.
  • Ingestion points: Target binary files provided via the --binary flag in scripts/security_suite.py and repository files scanned via the --repo-root flag in scripts/prompt_redteam.py.
  • Boundary markers: Absent. The skill does not wrap external data in delimiters or provide explicit instructions to the agent to ignore any embedded directives within the files being processed.
  • Capability inventory: Executing arbitrary binaries (subprocess.Popen), reading file contents (Path.read_text), and monitoring system processes and network connections (ps, lsof).
  • Sanitization: The script uses shlex.quote and list-based execution to prevent command injection at the shell level, but it does not sanitize or validate the behavior of the binaries it executes or the content it reads from the repository.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 14, 2026, 09:47 AM