mid-server
Warn
Audited by Gen Agent Trust Hub on Feb 23, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides structured templates and instructions for executing PowerShell and SSH commands on remote target hosts using the MID Server as a proxy. These patterns can be used to execute arbitrary commands on internal infrastructure.
- [REMOTE_CODE_EXECUTION]: The
executeMIDScriptfunction facilitates the execution of arbitrary JavaScript code on the MID Server via theJSProbetopic. This allows for runtime code execution in the target environment. - [PROMPT_INJECTION]: The skill exposes a surface for indirect prompt injection (Category 8).
- Ingestion points: The agent processes potentially untrusted data from the
ecc_queue(input records) anddiscovery_sensors(probe results) retrieved via thesnow_query_tabletool. - Boundary markers: There are no explicit delimiters or boundary markers to distinguish between system instructions and data ingested from the ECC queue.
- Capability inventory: The skill possesses high-impact capabilities including writing to the ECC Queue (triggering remote execution) and executing PowerShell/SSH commands via
snow_execute_script_with_output. - Sanitization: While basic
escapeXMLis used for XML parameters, script payloads and command strings are handled without sufficient sanitization to prevent injection if an attacker-controlled input record is processed.
Audit Metadata