skills/mukul975/anthropic-cybersecurity-skills/performing-cloud-penetration-testing-with-pacu/Gen Agent Trust Hub
performing-cloud-penetration-testing-with-pacu
Warn
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyusessubprocess.run()to execute thepacucommand-line tool. This allows the skill to automate offensive security modules for enumeration and exploitation within an AWS environment. - [EXTERNAL_DOWNLOADS]: The skill requires the installation of
pacu, a third-party exploitation framework, which is downloaded viapipas described inSKILL.mdandreferences/api-reference.md. - [DATA_EXFILTRATION]: The automated script
scripts/agent.pycollects extensive sensitive information from the AWS environment, including IAM user lists, role trust policies, and potential privilege escalation vectors. This data is saved to a local JSON file (pacu_pentest_[date].json), which represents significant data exposure. - [PROMPT_INJECTION]: The skill possesses an attack surface for indirect prompt injection because it ingests untrusted data from an external AWS environment.
- Ingestion points: In
scripts/agent.py, the script retrieves IAM policy documents and metadata usingboto3calls such asiam.get_policy_version(). - Boundary markers: There are no delimiters or instructions to ignore embedded commands within the retrieved data.
- Capability inventory: The script has the ability to execute shell commands (via
pacu) and perform file system writes. - Sanitization: The script does not validate or sanitize the policy content or metadata before processing it, potentially allowing malicious content in an AWS environment to influence the agent's behavior.
Audit Metadata