skills/mukul975/anthropic-cybersecurity-skills/analyzing-memory-dumps-with-volatility/Gen Agent Trust Hub
analyzing-memory-dumps-with-volatility
Warn
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyutilizessubprocess.run(shell=True)to execute Volatility 3 plugins. String interpolation is used to construct the command line, specifically with theextra_args,yara_rule, andpidparameters. This configuration is vulnerable to command injection if malicious strings containing shell metacharacters (e.g.,;,&&,|) are passed to these functions. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface. Because it is designed to take parameters like YARA rules or extra arguments which might be generated based on untrusted external data or malicious user prompts, the lack of sanitization combined with shell execution creates a path for an attacker to execute arbitrary commands on the agent's host environment.
Audit Metadata