prometheus
Pass
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses administrative commands to manage the Prometheus service and system firewall.
- Evidence: Commands such as
sudo systemctl reload prometheus,sudo kill -HUP, andsudo ufw alloware listed inSKILL.md. - Context: These operations are necessary for managing monitoring infrastructure and are expected for this skill's stated purpose.
- [EXTERNAL_DOWNLOADS]: The skill provides instructions for installing components using official distribution package managers.
- Evidence: References to
apt install prometheusanddnf install prometheusappear inSKILL.mdandreferences/common-patterns.md. - Context: These commands pull from trusted operating system repositories.
- [PROMPT_INJECTION]: The skill interacts with external scrape targets, creating a surface for indirect prompt injection via metric data.
- Ingestion points: Reads data from remote exporters via
curl http://<target-host>:<port>/metricsas seen inSKILL.md. - Boundary markers: Data is ingested into Prometheus and queried via
jq, but no specific instruction-boundary markers are present in the snippets. - Capability inventory: The skill has the ability to manage system services (
systemctl) and install software (apt). - Sanitization: No sanitization is mentioned for metric labels or annotations, but the structured nature of the data reduces the risk of instruction execution.
Audit Metadata