skills/mukul975/anthropic-cybersecurity-skills/analyzing-disk-image-with-autopsy/Gen Agent Trust Hub
analyzing-disk-image-with-autopsy
Warn
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Risk of command injection in
scripts/agent.py. The script usessubprocess.run(shell=True)to execute Sleuth Kit commands and interpolates theimage_pathandcase_dirvariables directly into these strings. Malicious inputs containing shell metacharacters (e.g.,;,&,|) could lead to arbitrary code execution. Evidence: Usage off"img_stat {image_path}"and similar patterns inscripts/agent.pyfunctions. \n- [COMMAND_EXECUTION]: Use of high-privilege commands for environment setup. The workflow inSKILL.mdinstructs users to runsudo apt-get install, which requires administrative privileges. Evidence:sudo apt-get install autopsy sleuthkitinSKILL.md. \n- [EXTERNAL_DOWNLOADS]: Fetching software and reference data from remote repositories. The skill downloads the Autopsy ZIP archive from GitHub and the NSRL hash database from AWS S3. These are documented as functional requirements from well-known sources. Evidence:wgetcommands inSKILL.mdtargetinggithub.com/sleuthkitands3.amazonaws.com/rds.nsrl.nist.gov. \n- [PROMPT_INJECTION]: Vulnerability to indirect prompt injection through forensic data ingestion. \n - Ingestion points: Forensic data is ingested through Sleuth Kit tools like
flsandistatwhich read metadata and filenames from the provided disk image, which are then processed and displayed byscripts/agent.py. \n - Boundary markers: No delimiters or sanitization are used when presenting the output of these tools. \n
- Capability inventory: The agent has the capability to execute shell commands and write to the file system. \n
- Sanitization: No validation or filtering is performed on the data extracted from the disk images before it is used or reported.
Audit Metadata