analyzing-linux-system-artifacts

Pass

Audited by Gen Agent Trust Hub on Apr 6, 2026

Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFE
Full Analysis
  • [DATA_EXFILTRATION]: The skill automates the collection and copying of sensitive system artifacts to a local directory for analysis. This includes authentication logs, system configuration files, and user-specific data such as shell histories and SSH keys.
  • [COMMAND_EXECUTION]: The Python script scripts/agent.py utilizes subprocess.run() to execute system commands such as find for discovering SUID/SGID binaries and locating suspicious files in temporary directories like /tmp and /dev/shm.
  • [CREDENTIALS_UNSAFE]: The forensic workflow specifically targets and reads sensitive credential information, including parsing /etc/shadow to determine password hash types and scanning user directories for SSH authorized_keys to detect potential backdoors.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 6, 2026, 06:44 PM