detecting-service-account-abuse
Pass
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyexecutes PowerShell commands to gather telemetry from the host system.\n - Evidence:
subprocess.check_outputis used to runpowershell -Commandin thequery_ad_service_accountsandcheck_interactive_logonsfunctions.\n - Context: These operations are necessary for the skill's primary purpose of threat hunting in Active Directory environments.\n- [PROMPT_INJECTION]: The script
scripts/process.pycreates a surface for indirect prompt injection by processing untrusted log data without proper isolation.\n - Ingestion points: Log files (JSON/CSV) are parsed by the
parse_logsfunction from user-provided input paths.\n - Boundary markers: The generated hunt report (
hunt_report.md) interpolates command lines and task content directly into markdown without delimiters or warnings.\n - Capability inventory: The skill environment allows for shell command execution via PowerShell as seen in
agent.py.\n - Sanitization: No sanitization, escaping, or validation is performed on the
CommandLineorTask_Contentfields extracted from the logs before they are written to findings reports.
Audit Metadata