skills/mukul975/anthropic-cybersecurity-skills/implementing-cloud-vulnerability-posture-management/Gen Agent Trust Hub
implementing-cloud-vulnerability-posture-management
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The scripts
scripts/agent.pyandscripts/process.pyuse thesubprocess.runmethod to execute the cloud security scanning toolsprowlerandscout. These executions are core to the skill's primary function of infrastructure auditing and follow safe practices by passing arguments as lists. - [EXTERNAL_DOWNLOADS]: The skill instructs the user to install established security tools such as Prowler and ScoutSuite via the Python package manager (pip). These are standard industry tools for cloud security assessments.
- [PROMPT_INJECTION]: The skill processes findings from external scan reports which represents a potential indirect prompt injection surface. However, this is inherent to the nature of security auditing tools, and no actual injection patterns or malicious instructions were found in the provided files.
- Ingestion points: Findings are ingested through
scripts/process.pyvia theparse_prowler_outputfunction which reads JSON-OCSF files. - Boundary markers: None explicitly present in the data processing scripts.
- Capability inventory: Uses
subprocess.runfor scanner execution andopen()for report generation in bothscripts/agent.pyandscripts/process.py. - Sanitization: Relies on standard JSON parsing without additional filtering of the content fields.
Audit Metadata