skills/mukul975/anthropic-cybersecurity-skills/detecting-t1055-process-injection-with-sysmon/Gen Agent Trust Hub
detecting-t1055-process-injection-with-sysmon
Pass
Audited by Gen Agent Trust Hub on Apr 18, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyutilizessubprocess.check_outputto run PowerShell commands for querying local Sysmon logs viaGet-WinEvent. This execution is restricted to local system diagnostics and uses type-validated or hardcoded parameters, posing no arbitrary command injection risk. - [DATA_EXPOSURE]: The skill accesses local Sysmon event logs to identify potential security incidents. This is the intended and documented behavior of the tool. There is no evidence of harvesting sensitive files (e.g., credentials, SSH keys) or performing network exfiltration.
- [SAFE]: The Python scripts (
scripts/agent.pyandscripts/process.py) are well-structured for security analysis purposes. They perform local data processing and reporting without external dependencies or hidden behaviors. - [SAFE]: Documentation and reference files provide legitimate security hunting workflows, Splunk queries, and Sigma rules consistent with industry standards for threat hunting.
Audit Metadata