infra-manage-ssh-services
Pass
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill makes extensive use of Bash to execute local and remote commands via SSH, including Docker management operations and connectivity tests.
- Evidence includes use of
ssh,docker ps,docker exec, andnc -zto manage services oninfra.localand other hosts. - [EXTERNAL_DOWNLOADS]: The skill uses
curlto perform health checks on internal network services such as Langfuse and Home Assistant. - Evidence:
curl -s -o /dev/null -w "%{http_code}" http://infra.local:3000. - [DATA_EXPOSURE_AND_EXFILTRATION]: Documentation provides guidance on where local secrets and SSH configurations are stored to facilitate management.
- Evidence: References to
~/.ssh/config,~/.zshrc, and.envfiles for managing connection aliases and environment variables. - [PERSISTENCE_MECHANISMS]: The skill includes a workflow for configuring passwordless SSH access by appending aliases and configuration to the user's SSH config file.
- Evidence: Use of
cat >> ~/.ssh/configto automate the setup of connection aliases for infrastructure hosts. - [INDIRECT_PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface as it processes output from remote logs and service status commands.
- Ingestion points: Remote command output from
ssh(e.g.,docker logs,docker ps), andcurlHTTP responses. - Boundary markers: No explicit delimiters or boundary markers are used when processing remote service data.
- Capability inventory: The skill utilizes
bash,ssh, and network tools to interact with remote environments. - Sanitization: No explicit sanitization or validation of the ingested remote data is performed before it is presented to the agent.
Audit Metadata