analyzing-linux-system-artifacts
Pass
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFE
Full Analysis
- [DATA_EXFILTRATION]: The skill automates the collection and copying of sensitive system artifacts to a local directory for analysis. This includes authentication logs, system configuration files, and user-specific data such as shell histories and SSH keys.
- [COMMAND_EXECUTION]: The Python script
scripts/agent.pyutilizessubprocess.run()to execute system commands such asfindfor discovering SUID/SGID binaries and locating suspicious files in temporary directories like/tmpand/dev/shm. - [CREDENTIALS_UNSAFE]: The forensic workflow specifically targets and reads sensitive credential information, including parsing
/etc/shadowto determine password hash types and scanning user directories for SSHauthorized_keysto detect potential backdoors.
Audit Metadata