skills/mukul975/anthropic-cybersecurity-skills/hardening-linux-endpoint-with-cis-benchmark/Gen Agent Trust Hub
hardening-linux-endpoint-with-cis-benchmark
Warn
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyutilizessubprocess.check_outputwith theshell=Trueparameter to execute various system audit commands (e.g.,modprobe,findmnt,sysctl). This is a security best-practice violation as it can lead to command injection if the command strings are ever constructed using external or untrusted data. - [DATA_EXPOSURE]: The audit agent (
scripts/agent.py) is designed to read highly sensitive system files, including/etc/shadow,/etc/gshadow, and/etc/ssh/sshd_config. While this access is necessary for a security compliance audit, it necessitates running the script with root privileges, which increases the impact of any potential vulnerability in the script. - [INDIRECT_PROMPT_INJECTION]: The skill is vulnerable to indirect injection via malicious data processing.
- Ingestion points:
scripts/process.pyingests and parses XML files provided via command-line arguments (OpenSCAP result files). - Boundary markers: None identified; the script trusts the structure and content of the provided XML file.
- Capability inventory:
scripts/agent.pyhas the capability to execute system commands viasubprocess, andscripts/process.pycan write JSON reports to the filesystem. - Sanitization: The
xml.etree.ElementTreeparser inscripts/process.pydoes not implement explicit protection against XML External Entity (XXE) attacks, which could allow an attacker providing a crafted XML result file to read local files or perform SSRF. - [EXTERNAL_DOWNLOADS]: The skill documentation correctly references trusted security resources, including the
ComplianceAsCodeandAnsible Lockdownrepositories on GitHub, for official benchmarks and remediation roles.
Audit Metadata