skills/mukul975/anthropic-cybersecurity-skills/analyzing-prefetch-files-for-execution-history/Gen Agent Trust Hub
analyzing-prefetch-files-for-execution-history
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [EXTERNAL_DOWNLOADS]: The
SKILL.mdfile directs users to download forensic tools from the official site of Eric Zimmerman, a well-known community source. - [COMMAND_EXECUTION]: The
scripts/agent.pyfile contains a functionrun_pecmdthat utilizessubprocess.runwithshell=Trueand string interpolation, creating a risk for command injection if malicious file paths are processed. - [COMMAND_EXECUTION]: The skill documentation includes instructions for high-privilege operations such as mounting forensic disk images.
- [PROMPT_INJECTION]: The skill exhibits a vulnerability surface for indirect prompt injection (Category 8).
- Ingestion points: The
scripts/agent.pyscript and embedded documentation scripts ingest filenames and binary metadata from untrusted Windows Prefetch (.pf) files. - Boundary markers: No isolation or delimitation techniques are present to prevent forensic data from being interpreted as instructions by the agent.
- Capability inventory: The skill possesses capabilities for filesystem interaction and subprocess execution.
- Sanitization: There is no evidence of sanitization or input validation for the data extracted from forensic artifacts.
Audit Metadata