skills/mukul975/anthropic-cybersecurity-skills/conducting-phishing-incident-response/Gen Agent Trust Hub
conducting-phishing-incident-response
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is designed to ingest and analyze untrusted content from phishing emails, which presents a risk of indirect prompt injection. An attacker could craft an email containing hidden instructions to influence the agent's analysis or trick it into performing unauthorized remediation actions. \n
- Ingestion points: The
scripts/agent.pytool parses EML files, and theSKILL.mdworkflow involves the agent reviewing email headers and body content. \n - Boundary markers: There are no explicit delimiters or instructions provided to the agent to help it differentiate between control instructions and the untrusted data being analyzed. \n
- Capability inventory: The agent has access to file-reading and network-request capabilities via the provided script, and is provided with high-privilege administrative commands in the documentation. \n
- Sanitization: No sanitization or filtering logic is present to identify or neutralize embedded instructions within the email data. \n- [COMMAND_EXECUTION]: The
SKILL.mddocumentation contains high-privilege PowerShell commands for Microsoft 365 environment remediation, such as resetting user passwords and revoking session tokens. While these are necessary for incident response, their availability as clear instructions poses a risk if an agent is manipulated by malicious data. \n- [EXTERNAL_DOWNLOADS]: Theagent.pyscript makes network requests to well-known security platforms, specifically VirusTotal (virustotal.com) and urlscan.io, to perform reputation checks. These operations are essential to the skill's functionality and target reputable services.
Audit Metadata