skills/mukul975/anthropic-cybersecurity-skills/correlating-security-events-in-qradar/Gen Agent Trust Hub
correlating-security-events-in-qradar
Pass
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection. It ingests log data and security events from QRadar which may contain attacker-controlled content. This content could influence the AI agent's analysis or decision-making during offense investigations.
- Ingestion points:
client.search_aql(),client.get_offenses(), andclient.get_offense_details()inscripts/agent.pyingest external log and offense data into the agent context. - Boundary markers: None identified. Data is processed without explicit delimiters or instructions to ignore embedded commands.
- Capability inventory:
client.close_offense()andclient.add_to_reference_set()inscripts/agent.pyallow the agent to modify the state of the SIEM based on processed data. - Sanitization: None identified. The script performs no validation or escaping of the ingested data.
- [SAFE]: The
QRadarClientclass inscripts/agent.pydefaults toverify_ssl=False. This disables SSL/TLS certificate verification for all API communication with the QRadar host, making the connection susceptible to Man-in-the-Middle (MitM) attacks. This is a security best practice violation. - [SAFE]: The skill follows secure credential management practices by using environment variables (
QRADAR_TOKEN) rather than hardcoding secrets. Placeholders likeYOUR_API_TOKENinSKILL.mdandreferences/api-reference.mdare used for instructional purposes only.
Audit Metadata