auditing-access-control
Pass
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes untrusted data from local codebases and configuration files.
- Ingestion points: IAM policy files, RBAC configurations, ACL definitions, and API route handlers identified via
GlobandGrepinSKILL.md. - Boundary markers: No specific delimiters or instructions are provided to the agent to distinguish between its own logic and instructions potentially embedded in the audited files.
- Capability inventory: The skill uses
Read,Write,Edit, andBash(with restricted profiles) to perform its tasks, including writing report files viascripts/access_control_audit.py. - Sanitization: No explicit sanitization or validation of the ingested content is described before processing.
- [COMMAND_EXECUTION]: The skill requires the use of shell utilities and cloud CLI tools for its auditing functions.
- Evidence:
SKILL.mddirects the agent to usegrepandfindfor scanning. It also specifies the use ofaws iam,gcloud, andaz roleCLI tools to audit cloud configurations. These operations are consistent with the skill's purpose as an access control auditor.
Audit Metadata