skills/mukul975/anthropic-cybersecurity-skills/detecting-cloud-cryptomining-activity/Gen Agent Trust Hub
detecting-cloud-cryptomining-activity
Warn
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/agent.pyscript utilizes thesubprocessmodule to execute AWS CLI commands for retrieving GuardDuty findings, CloudWatch metrics, and VPC flow logs. - [COMMAND_EXECUTION]: The skill features high-privilege remediation functions including
ec2 terminate-instancesandiam update-access-keyintended for neutralizing detected mining infrastructure. - [PROMPT_INJECTION]: The skill processes external, potentially attacker-influenced data from security logs and finding types, which constitutes an indirect injection surface.
- Ingestion points:
scripts/agent.pyingests data fromaws guardduty list-findingsandaws logs start-query(VPC flow logs). - Boundary markers: Absent; the skill does not use specific delimiters or instructions to prevent the processing of malicious content within logs.
- Capability inventory: The script has the capability to terminate cloud resources (
terminate-instances) and modify access keys. - Sanitization: Absent; the implementation relies on the structured nature of CLI JSON output but does not validate the content of the log entries themselves.
Audit Metadata