skills/mukul975/anthropic-cybersecurity-skills/analyzing-email-headers-for-phishing-investigation/Gen Agent Trust Hub
analyzing-email-headers-for-phishing-investigation
Fail
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
dns_lookupfunction inscripts/agent.pyis vulnerable to shell command injection. It constructs commands using string interpolation of variables (domainandrecord_type) and executes them viasubprocess.runwithshell=True. Since these inputs can be derived from malicious email headers being analyzed, an attacker could execute arbitrary system commands.\n- [PROMPT_INJECTION]: The skill demonstrates a vulnerability to indirect prompt injection by processing untrusted external data (phishing emails).\n - Ingestion points:
scripts/agent.pyreads and parses EML files, extracting header fields such asFrom,Subject, andReceived.\n - Boundary markers (present/absent): Absent. No isolation or boundary markers are used to separate untrusted data from instructions.\n
- Capability inventory: The script possesses the capability to execute shell commands through the
dns_lookupfunction inscripts/agent.py.\n - Sanitization (present/absent): Absent. No sanitization or validation is applied to extracted headers before they are used in system calls or displayed.
Recommendations
- AI detected serious security threats
Audit Metadata