infrastructure-backup-restore
Warn
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes
sudoto perform high-privilege operations, including modifying user groups (usermod), managing systemd service files in/etc/systemd/system/, and accessing protected Docker volume data in/var/lib/docker/volumes/. - [DATA_EXFILTRATION]: The skill procedures involve copying sensitive
.envfiles and Docker volume contents known to contain API tokens (Cloudflare, Google OAuth), passwords, and webhook secrets into backup archives. - [EXTERNAL_DOWNLOADS]: Fetches the official Docker installation script from
https://get.docker.comand executes it. This is a well-known service used for infrastructure provisioning. - [PROMPT_INJECTION]: The skill processes untrusted infrastructure configuration files and has the capability to execute commands based on their content via
docker composeor shell operations. - Ingestion points: Reads configuration files from
/home/dawiddutoit/projects/network/. - Boundary markers: Absent.
- Capability inventory: High-privilege shell execution (
sudo), service management (docker compose), and file system manipulation. - Sanitization: Absent; files are processed and archived without validation.
Audit Metadata