skills/mukul975/anthropic-cybersecurity-skills/conducting-wireless-network-penetration-test/Gen Agent Trust Hub
conducting-wireless-network-penetration-test
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyexecutes external wireless auditing tools includingairodump-ng,aircrack-ng,wash, andiwconfigusing thesubprocess.run()function. It correctly employs argument lists rather than shell strings, which effectively mitigates common shell injection risks associated with external tool invocation. - [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection as it ingests untrusted data from the physical wireless environment, such as SSIDs and client probe requests, which are then included in the final report.
- Ingestion points: Found in
scripts/agent.pywithin thescan_access_pointsanddetect_client_probesfunctions where raw 802.11 frames are parsed. - Boundary markers: The script does not implement explicit delimiters or instruction guards when interpolating captured wireless data into the report structure.
- Capability inventory: The script possesses capabilities for system command execution (
subprocess.run) and network packet injection (scapy.sendp). - Sanitization: Input strings are decoded using UTF-8 with errors ignored, but no specific sanitization for malicious instructions targeting the LLM is present.
Audit Metadata