skills/mukul975/anthropic-cybersecurity-skills/building-vulnerability-scanning-workflow/Gen Agent Trust Hub
building-vulnerability-scanning-workflow
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyexecutes Nmap scans using thepython-nmaplibrary to perform service version detection and vulnerability script execution on user-defined targets. - [EXTERNAL_DOWNLOADS]: The skill fetches the Known Exploited Vulnerabilities (KEV) catalog from the official CISA website (cisa.gov). This is a well-known and trusted government source.
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8) because it processes untrusted data from external sources and network scans.
- Ingestion points: The skill ingests untrusted service version strings and script output via Nmap in
scripts/agent.pyand scan data from Nessus/Qualys APIs inSKILL.md. - Boundary markers: No explicit boundary markers or instructions to ignore embedded commands are present in the scripts or prompt templates.
- Capability inventory: The agent has the capability to write files (
vuln_report.json) and execute subprocesses (Nmap) as seen inscripts/agent.py. - Sanitization: The ingested data is processed directly without sanitization or validation before being included in reports or used for prioritization logic.
- [SAFE]: The implementation in
scripts/agent.pyand code examples inSKILL.mddisable SSL certificate verification (verify=False) for Nessus and ServiceNow API requests. This is a common but discouraged practice that makes connections vulnerable to Man-in-the-Middle (MITM) attacks.
Audit Metadata