detecting-cryptomining-in-cloud
Pass
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyexecutes AWS CLI commands to interact with cloud infrastructure. The implementation is secure as it uses list-based arguments withsubprocess.runrather than shell strings, preventing typical command injection vulnerabilities. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to its ingestion of external telemetry data. * Ingestion points: The agent fetches GuardDuty findings and CloudTrail events in
scripts/agent.py. * Boundary markers: No delimiters are used to separate ingested data from agent instructions. * Capability inventory: The skill has permissions to create security groups and modify instance attributes. * Sanitization: The output is parsed as JSON, but the content of the findings (e.g., resource names or finding descriptions) is not sanitized for potential embedded instructions. - [DATA_EXFILTRATION]: The skill accesses sensitive cloud metadata, including billing alerts and network logs. This access is strictly aligned with the skill's primary purpose of security monitoring and incident response.
Audit Metadata