skills/jeremylongshore/claude-code-plugins-plus-skills/managing-network-policies/Gen Agent Trust Hub
managing-network-policies
Warn
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/generate_network_policy.pyincludes logic to generate shell scripts and explicitly sets executable permissions usingfile_path.chmod(0o755). - Evidence:
scripts/generate_network_policy.pyuseschmod(0o755)on files generated from thetemplatevariable. - [REMOTE_CODE_EXECUTION]: The skill implements a dynamic code generation pattern where the
generate_network_policy.pyutility assembles executable.shfiles using content provided via the--contentcommand-line argument. - Evidence:
scripts/generate_network_policy.pyallows the creation of executable bash scripts from theargs.contentparameter without validation or sanitization. - [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection because it processes external data (network policy configurations and content) and provides capabilities to write executable files and run
kubectlcommands. The absence of strict boundary markers or sanitization for input used in script generation increases the risk of the agent being manipulated into executing unauthorized actions. - Ingestion points: The
--contentand--configarguments inscripts/generate_network_policy.pyaccept external data. - Boundary markers: No delimiters or instructions to ignore embedded commands are present in the script generation logic.
- Capability inventory: The skill has
WriteandEditpermissions, along with restrictedBash(kubectl:*)access. - Sanitization: No sanitization or validation is performed on the content before it is written to an executable script.
- [SAFE]: The skill references documentation and tools from well-known technology services and official project repositories.
- Evidence: Links to
kubernetes.io,tigera.io(Calico), andcilium.ioare documented as resources.
Audit Metadata