skills/mukul975/anthropic-cybersecurity-skills/hunting-for-domain-fronting-c2-traffic/Gen Agent Trust Hub
hunting-for-domain-fronting-c2-traffic
Pass
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: SAFEDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The script
scripts/agent.pyusessocket.connect(line 89) to initiate network connections to hostnames extracted from the provided proxy logs. This facilitates TLS certificate inspection but also allows for outbound connectivity to arbitrary hostnames encountered in the input data.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through the processing of untrusted log files.\n - Ingestion points: The
load_proxy_logsfunction inscripts/agent.py(line 33) ingests data from a user-supplied CSV file.\n - Boundary markers: The system does not employ boundary markers or specific instructions to isolate or ignore potentially malicious commands embedded within the log entries.\n
- Capability inventory: The skill includes file system access (
openat lines 33 and 142) and network connectivity capabilities (socket.connectat line 89).\n - Sanitization: The script lacks sanitization or validation mechanisms to filter or escape the content of log fields before processing or reporting.
Audit Metadata