hses-packet-analysis
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill instructions include executing
cargo testandcargo run. This executes arbitrary code within the workspace context, which could lead to code execution vulnerabilities if the repository contains malicious scripts or dependencies. - [COMMAND_EXECUTION] (HIGH): The skill utilizes
tshark -i anyfor background packet capture. Capturing on 'any' interface typically requires root/sudo privileges and allows the agent to monitor all unencrypted network traffic on the host, including sensitive data from unrelated processes. - [EXTERNAL_DOWNLOADS] (SAFE): The prerequisites recommend installing
tsharkviaapt, which is a trusted system package manager. - [INDIRECT_PROMPT_INJECTION] (LOW): The skill processes untrusted external data in the form of network packets.
- Ingestion points: Raw hex data is read from
hses_export_{timestamp}.txtfor protocol analysis. - Boundary markers: Absent. No delimiters or instructions are used to prevent the agent from interpreting packet data as commands.
- Capability inventory: File system access (
mkdir), network monitoring (tshark), process management (pkill), and code execution (cargo). - Sanitization: Absent. The skill processes hex data directly into a markdown report without validation or escaping.
Recommendations
- AI detected serious security threats
Audit Metadata