incident-response
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The Python script
scripts/generate-incident-report.pyis vulnerable to path traversal. Thetitleandoutput_dirparameters are not sanitized, allowing an attacker to write files to arbitrary locations such as/etc/cron.d/or~/.bashrcvia manipulated agent inputs.\n- [PROMPT_INJECTION] (HIGH): The skill's log-fetching functionality (fetch-logs.sh) creates an indirect prompt injection vector. Malicious content within application logs can override the AI agent's instructions when it processes those logs for analysis.\n- [COMMAND_EXECUTION] (HIGH): Bash scriptsfetch-logs.shandhealth-check-all-services.shinterpolate user-provided arguments directly into Docker and curl commands. This lack of rigorous sanitization poses a high risk of command injection on the host system, especially given the high privileges often associated with Docker access.\n- [DATA_EXPOSURE] (MEDIUM): Collected logs containing potentially sensitive information are stored unencrypted in local directories without proper access controls or lifecycle management.
Recommendations
- AI detected serious security threats
Audit Metadata