skills/mukul975/anthropic-cybersecurity-skills/analyzing-network-traffic-for-incidents/Gen Agent Trust Hub
analyzing-network-traffic-for-incidents
Fail
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyusessubprocess.run(shell=True)with f-string interpolation for thepcap_pathvariable across multiple functions, includingrun_tshark,get_pcap_summary,detect_data_exfiltration, andextract_ids_alerts. This allows for arbitrary command execution if an attacker provides a crafted filename containing shell metacharacters (e.g.,;,|, or backticks). - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection through the processing of untrusted network traffic data.
- Ingestion points: Network metadata (DNS queries, HTTP objects) extracted from PCAP files in
scripts/agent.pyand displayed to the agent. - Boundary markers: Absent; there are no delimiters or instructions telling the agent to treat extracted network data as untrusted content.
- Capability inventory: The agent has access to system command execution via
agent.pyand the tools mentioned inSKILL.md. - Sanitization: Absent; the script does not sanitize DNS query names or exported filenames before returning them to the agent context.
- [EXTERNAL_DOWNLOADS]: The skill references several external network forensic tools including
Wireshark,Zeek,Suricata,Arkime, andRITA. While these are well-known security tools, their use on untrusted PCAP files requires users to maintain updated versions to mitigate protocol-level exploitation risks.
Recommendations
- AI detected serious security threats
Audit Metadata