skills/jeremylongshore/claude-code-plugins-plus-skills/analyzing-security-headers/Gen Agent Trust Hub
analyzing-security-headers
Warn
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/generate_report.pyimplements agenerate_scriptmethod that assembles shell scripts from template strings and applies executable permissions usingchmod(0o755). This facilitates the dynamic creation and preparation of executable code at runtime.\n- [DATA_EXFILTRATION]: Thescripts/analyze_headers.pyscript performs recursive directory traversal and file metadata collection (rglob('*')) on a target path. This functionality is inconsistent with its stated purpose of HTTP header analysis and could be used to expose the structure and contents of the local file system to the agent.\n- [PROMPT_INJECTION]:scripts/analyze_headers.pycontains deceptive docstrings and command-line help text that claim the script usesrequestsandbeautifulsoup4for web analysis, whereas the implementation is strictly for file system analysis. This discrepancy can mislead an agent into executing file system operations under the impression it is performing web audits.\n- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it fetches data from external domains viaWebFetchand utilizes that data to generate reports or scripts. The absence of boundary markers or sanitization logic inSKILL.mdmeans malicious headers from a target site could influence the content of generated shell scripts. (Ingestion point: WebFetch in SKILL.md; Boundary markers: Absent; Capability: Script generation in generate_report.py; Sanitization: Absent).
Audit Metadata