skills/mukul975/anthropic-cybersecurity-skills/deploying-osquery-for-endpoint-monitoring/Gen Agent Trust Hub
deploying-osquery-for-endpoint-monitoring
Pass
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/agent.pyscript utilizes thesubprocessmodule to execute theosqueryibinary. This is the standard method for interacting with osquery to retrieve system telemetry and is consistent with the skill's purpose. - [EXTERNAL_DOWNLOADS]: The
SKILL.mdfile directs users to download osquery from official sources, includingosquery.ioandpkg.osquery.io. It also referencesfleetdm.comfor centralized fleet management. These are trusted, well-known services within the cybersecurity community. - [DATA_EXFILTRATION]: The
scripts/agent.pyfile collects sensitive system data such as listening ports, SUID binaries, and SSH authorized keys. The script is capable of sending this data to a user-provided Fleet server URL. This behavior is documented and represents the primary intended function of the monitoring agent. - [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection via system telemetry ingestion. Ingestion points:
scripts/process.pyreads osquery result logs from the file system. Boundary markers: None; logs are processed as raw JSON lines. Capability inventory:scripts/agent.pycan execute local commands (osqueryi) and perform network operations. Sanitization: The processing script decodes JSON but does not sanitize data fields for potential instruction-carrying content. This is considered a low-risk architectural characteristic for this type of tool.
Audit Metadata