skills/mukul975/anthropic-cybersecurity-skills/implementing-infrastructure-as-code-security-scanning/Gen Agent Trust Hub
implementing-infrastructure-as-code-security-scanning
Pass
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The scripts
scripts/agent.pyandscripts/process.pyinvoke external command-line tools (checkovandtfsec) to perform security audits. These invocations use Python'ssubprocess.runwith list-based arguments, which is a secure implementation that avoids shell interpolation and protects against command injection. - [EXTERNAL_DOWNLOADS]: The skill documentation includes instructions for installing
checkovvia standard package managers.checkovis a widely recognized and trusted open-source security tool provided by Bridgecrew. - [PROMPT_INJECTION]: This skill possesses an indirect prompt injection surface because it processes untrusted data from local infrastructure configuration files.
- Ingestion points: The scripts read files and directories specified via CLI arguments in
scripts/agent.pyandscripts/process.py. - Boundary markers: The scripts do not use explicit delimiters to separate scanned content from processing logic, though they treat the content as data for analysis.
- Capability inventory: The skill uses
subprocess.runto call external scanners and writes scan results to JSON files viajson.dump. - Sanitization: Results are parsed using
json.loadsand processed as structured data, which is appropriate for its role as a diagnostic security tool.
Audit Metadata