skills/mukul975/anthropic-cybersecurity-skills/implementing-mimecast-targeted-attack-protection/Gen Agent Trust Hub
implementing-mimecast-targeted-attack-protection
Warn
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONSAFE
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyusessubprocess.runto execute the systemcurlcommand for interacting with the Mimecast API. - Evidence: The
mimecast_requestfunction inscripts/agent.pyconstructs a command list starting withcurland executes it usingsubprocess.run(cmd, ...). - Context: While the command is structured as a list to mitigate shell injection, invoking external binaries for network operations is a high-risk pattern compared to using native Python libraries like
requests. - [PROMPT_INJECTION]: The skill processes untrusted external data (email headers and logs) which constitutes an indirect prompt injection surface.
- Ingestion points:
scripts/agent.pyretrieves log data containing sender addresses, recipient addresses, and display names from the Mimecast API. - Boundary markers: There are no explicit boundary markers or instructions to ignore embedded commands when the script outputs these strings to the console or the report file.
- Capability inventory: The script has the capability to execute commands via
subprocess.runand write files to the local disk. - Sanitization: No sanitization or escaping is performed on the data fetched from the external API before it is processed or displayed.
- [SAFE]: The policy auditing logic in
scripts/process.pyis implemented using safe data processing techniques and does not perform any network or dangerous system operations. - [SAFE]: Documentation and reference files provide legitimate configuration guidance for Mimecast services and contain no malicious code or instructions.
Audit Metadata