analyzing-linux-elf-malware
Pass
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyutilizessubprocess.runto call forensic utilities includingstrings,readelf, andupx. These executions use argument lists rather than shell strings, which prevents shell-based command injection from malicious filenames.\n- [PROMPT_INJECTION]: The skill features an indirect prompt injection surface inscripts/agent.pythrough theextract_stringsfunction. This function parses strings from untrusted binary files and injects them into the agent's context. This is a common surface for security tools, as a malicious ELF could contain instructions aimed at influencing an LLM's logic if the output is processed as instructions without sanitization.\n- [DATA_EXFILTRATION]: Analysis ofscripts/agent.pyconfirms that while it reads local binary files for metadata and indicator extraction, it does not implement any network communication capabilities, preventing the exfiltration of analyzed data.
Audit Metadata