skills/mukul975/anthropic-cybersecurity-skills/implementing-vulnerability-management-with-greenbone/Gen Agent Trust Hub
implementing-vulnerability-management-with-greenbone
Fail
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [CREDENTIALS_UNSAFE]: The script
scripts/agent.pycontains hardcoded default credentials. \n - Evidence: Default parameters
username='admin'andpassword='admin'are defined in theconnect_gvmfunction and theargparseCLI configuration.\n- [PROMPT_INJECTION]: The skill processes untrusted scan data, creating a surface for indirect prompt injection. \n - Ingestion points: The skill ingests external scan results via the
parse_report_xmlandanalyze_offline_reportfunctions inscripts/agent.py. \n - Boundary markers: No delimiters or specific instructions are provided to the agent to treat scan data as untrusted content. \n
- Capability inventory: The skill has the capability to initiate network connections using the
python-gvmlibrary and write report files to the local filesystem. \n - Sanitization: There is no evidence of sanitization or validation of the ingested vulnerability data before it is processed or summarized. \n- [EXTERNAL_DOWNLOADS]: The skill utilizes the
python-gvmlibrary, which is an external dependency from a well-known source.
Recommendations
- AI detected serious security threats
Audit Metadata