skills/mukul975/anthropic-cybersecurity-skills/implementing-usb-device-control-policy/Gen Agent Trust Hub
implementing-usb-device-control-policy
Pass
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyand documentation inreferences/api-reference.mdusesubprocess.runto execute system commands such aslsusb,usbguard, andpowershell. These commands are used to audit the status of security policies and connected hardware. The commands are constructed using static strings or predefined list arguments, which prevents command injection from user-supplied input.\n- [PROMPT_INJECTION]: The utilityscripts/process.pyparses CSV files containing endpoint logs to generate USB activity reports. This ingestion of external data represents an indirect prompt injection surface where malicious content embedded in the log fields (e.g., a device name containing instructions) could potentially influence the agent's reasoning when interpreting the report.\n - Ingestion points: Data is read from CSV files in
scripts/process.pyviacsv.DictReader.\n - Boundary markers: No explicit delimiters or instructions to ignore embedded commands are included in the processing logic.\n
- Capability inventory: The skill contains scripts with the ability to perform file system writes and execute system commands.\n
- Sanitization: The script performs no sanitization or escaping of the ingested CSV field values before including them in the final JSON report.
Audit Metadata