configuring-ldap-security-hardening

Pass

Audited by Gen Agent Trust Hub on Mar 16, 2026

Risk Level: SAFE
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The skill requires the ldap3 Python library, which is a standard and well-known package for LDAP interactions. It is referenced in scripts/agent.py and documentation.
  • [COMMAND_EXECUTION]: The scripts/agent.py tool performs network operations to connect to LDAP servers on ports 389 and 636. These operations are restricted to auditing security configurations and do not involve arbitrary command execution or shell injection.
  • [DATA_EXFILTRATION]: No evidence of unauthorized data transmission was found. The script processes credentials (username and password) only when provided by the user via command-line arguments for authentication tests. It does not access sensitive local files or hardcoded secrets.
  • [INDIRECT_PROMPT_INJECTION]: The script ingests data from LDAP server responses (e.g., rootDSE and user object counts).
  • Ingestion points: LDAP search results in scripts/agent.py (e.g., conn.entries).
  • Boundary markers: Not applicable, as the data is used for diagnostic printing and not passed to an LLM or shell for execution.
  • Capability inventory: The script is limited to network connections and file writing (JSON report).
  • Sanitization: Output is printed directly to the console or serialized to JSON; no execution of remote data occurs.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 16, 2026, 07:58 AM