skills/mukul975/anthropic-cybersecurity-skills/analyzing-network-traffic-with-wireshark/Gen Agent Trust Hub
analyzing-network-traffic-with-wireshark
Warn
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyutilizessubprocess.run(shell=True)with string interpolation in functions such asrun_tshark,capture_live, andapply_display_filter. This pattern is susceptible to shell command injection if inputs likepcap_path,interface, ordisplay_filterare derived from untrusted sources without validation.\n- [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection. It extracts and processes data from network packets, such as HTTP User-Agents, DNS queries, and TLS SNI fields, which are then returned as text to the AI agent. Maliciously crafted network traffic could contain instructions designed to influence the agent's logic during analysis.\n - Ingestion points: Network packet data from PCAP files enters the agent context via
extract_http_requests,extract_dns_queries, andextract_tls_infoinscripts/agent.py.\n - Boundary markers: None present; data is extracted and printed as raw strings to stdout without delimiters.\n
- Capability inventory: The skill can execute arbitrary
tsharkcommands, perform live captures, and export objects to the local filesystem viascripts/agent.py.\n - Sanitization: No sanitization, escaping, or validation is performed on the strings extracted from packet fields before they are returned to the agent.
Audit Metadata