debug-firewall
Warn
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Uses
sudoto perform administrative operations, including modifyingiptablesfirewall rules, viewing kernel logs withdmesg, and accessing restricted log files in/tmp. - [COMMAND_EXECUTION]: Employs
docker execanddocker logsto interact with containers, allowing the execution of arbitrary commands within theawf-squidandawf-agentenvironments. - [COMMAND_EXECUTION]: Instructs the agent to run a local cleanup script (
./scripts/ci/cleanup.sh) and remove docker networks and containers. - [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface by reading external traffic logs.
- Ingestion points: Network access logs are read from
/var/log/squid/access.logusingcat,grep, andawk(SKILL.md). - Boundary markers: No delimiters or warnings are used to prevent the agent from interpreting log content as instructions.
- Capability inventory: The skill can execute shell commands via
sudo, manageiptables, and run commands in Docker containers (SKILL.md). - Sanitization: There is no evidence of sanitization or filtering of the log data before it is presented to the agent.
Audit Metadata