skills/mukul975/anthropic-cybersecurity-skills/detecting-network-anomalies-with-zeek/Gen Agent Trust Hub
detecting-network-anomalies-with-zeek
Pass
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: SAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill provides instructions to download and build Zeek from its official GitHub repository (https://github.com/zeek/zeek). This is a well-known and trusted source for network security software.
- [COMMAND_EXECUTION]: The script
scripts/agent.pyutilizessubprocess.runto interact with the system's Zeek installation. It executes commands such aszeek --version,zeekctl status, andzeek -rto process PCAP files. These operations use list-based arguments to prevent shell injection and are consistent with the skill's operational requirements. - [COMMAND_EXECUTION]:
SKILL.mdcontains instructions for the user to perform system-level configurations usingsudo, including package installation, network interface tuning withethtool, and service deployment withzeekctl. These elevated privileges are standard for tools requiring raw network packet access. - [COMMAND_EXECUTION]: A persistence mechanism is established via a cron job (
/etc/cron.d/zeek-logrotate) to handle periodic log maintenance. This is a routine administrative task for the Zeek monitoring service. - [PROMPT_INJECTION]: The skill presents a surface for indirect prompt injection because it ingests and processes untrusted network metadata from Zeek logs (e.g., DNS queries, HTTP user agents). While
agent.pyparses these logs safely into structured data, a downstream LLM processing the resulting reports could be influenced by malicious content embedded within the network traffic. - [SAFE]: The skill uses placeholders for sensitive information, such as
${ES_PASSWORD}in the Filebeat configuration, avoiding the use of hardcoded credentials.
Audit Metadata