skills/mukul975/anthropic-cybersecurity-skills/building-threat-intelligence-platform/Gen Agent Trust Hub
building-threat-intelligence-platform
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFECREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The Docker Compose configuration in
SKILL.mdincludes default credentials. - Evidence:
APP__ADMIN__PASSWORD=TIPAdminPasswordandAPP__ADMIN__TOKEN=tip-opencti-token-uuidare hardcoded in the YAML service definition for OpenCTI. - Context: These are provided as setup defaults and should be replaced by users in production environments.
- [PROMPT_INJECTION]: The skill processes untrusted data from external threat intelligence feeds, creating a vulnerability surface for indirect prompt injection.
- Ingestion points: The skill ingests OSINT feeds via MISP and OpenCTI connectors as defined in
scripts/process.pyandSKILL.md. - Boundary markers: The processing scripts do not implement clear delimiters or instructions to the model to ignore potential commands embedded within indicator data.
- Capability inventory: The skill has the capability to perform API operations (network requests) against MISP, OpenCTI, and Cortex, and to write files to the local disk (
scripts/process.py). - Sanitization: Indicators such as URLs and email addresses are processed with minimal validation (prefix checks), lacking robust sanitization to prevent the inclusion of malicious LLM instructions.
Audit Metadata