skills/mukul975/anthropic-cybersecurity-skills/collecting-indicators-of-compromise/Gen Agent Trust Hub
collecting-indicators-of-compromise
Pass
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill has an indirect prompt injection surface because it is designed to ingest and process untrusted data from incident evidence sources like SIEM logs and network captures.
- Ingestion points: The
scripts/agent.pyscript accepts untrusted content through the--input-fileand--input-textCLI arguments. - Boundary markers: No specific boundary markers or instructions to ignore embedded instructions are present in the processing logic.
- Capability inventory: The skill script (
scripts/agent.py) can perform network operations via therequestslibrary and write files to the local system using theopenfunction. - Sanitization: Indicators are extracted using regular expressions for IPv4 addresses, domains, URLs, and file hashes (MD5/SHA-256), which provides a layer of data validation.
- [DATA_EXFILTRATION]: The skill performs network requests to well-known security intelligence platforms, including VirusTotal, MalwareBazaar, and AbuseIPDB, to retrieve reputation data for extracted indicators. These operations are consistent with the skill's documented purpose for threat intelligence enrichment.
- [COMMAND_EXECUTION]: The
agent.pyscript performs local file system operations, including reading from specified input files and writing STIX-formatted JSON bundles to an output path. These activities are routine for a command-line utility designed for data processing.
Audit Metadata