skills/mukul975/anthropic-cybersecurity-skills/detecting-compromised-cloud-credentials/Gen Agent Trust Hub
detecting-compromised-cloud-credentials
Pass
Audited by Gen Agent Trust Hub on Apr 19, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses shell commands and a Python script (
scripts/agent.py) to interact with cloud provider CLIs. The Python agent usessubprocess.runwith list-based arguments, which is a secure method for executing external binaries as it avoids shell interpretation and potential command injection vulnerabilities. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface as it ingests and processes security log data from external cloud services.
- Ingestion points: External data enters the script's context via the output of
aws guardduty list-findingsandaws cloudtrail lookup-eventsinscripts/agent.py. - Boundary markers: Absent; the script relies on the structural integrity of the cloud provider's JSON responses rather than explicit delimiters.
- Capability inventory: The skill possesses the capability to modify IAM policies, deactivate access keys, and revoke authentication sessions.
- Sanitization: The script uses
json.loadsfor data extraction and employs list-based subprocess calls to ensure that ingested data cannot be executed as shell commands. - [SAFE]: Static analysis detected hardcoded credential patterns (e.g.,
AKIAXXXXXXXXXXXXXXXX), but these were verified to be non-functional placeholders used exclusively for documentation and demonstration purposes.
Audit Metadata