detecting-rootkit-activity
Pass
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyinvokes external security binaries including Volatility 3, rkhunter, and chkrootkit using thesubprocess.runmethod. These executions are performed using argument arrays rather than shell strings, which effectively mitigates the risk of command injection from user-supplied file paths or arguments.\n- [SAFE]: The skill performs diagnostic file system operations, such as scanning/tmpand/dev/shmfor hidden files usingos.listdir. These actions are read-only, limited to metadata inspection, and directly support the skill's stated purpose of malware and rootkit detection.\n- [SAFE]: The workflow instructions inSKILL.mdprovide legitimate cybersecurity procedures for cross-view process analysis and kernel structure verification. All embedded code snippets follow standard forensic best practices and do not contain obfuscated commands or unauthorized network operations.
Audit Metadata