configuring-suricata-for-network-monitoring
Warn
Audited by Snyk on Mar 16, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.70). The skill explicitly downloads and uses public community rule sources (e.g., enabling et/open and ptresearch/attackdetection in "Step 4: Download and Manage Rulesets" of SKILL.md and the scripts/agent.py update_rules() that runs suricata-update), so it ingests untrusted, user-sourced rule content that will be interpreted by Suricata and can materially alter detection/response behavior.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). Yes — the skill explicitly instructs use of sudo to install packages, edit system files under /etc (suricata.yaml, rules), create and enable a systemd service, modify network/iptables and kernel NIC settings (ethtool, ip link), all of which change the system state and require elevated privileges.
Issues (2)
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata