skills/mukul975/anthropic-cybersecurity-skills/performing-network-packet-capture-analysis/Gen Agent Trust Hub
performing-network-packet-capture-analysis
Pass
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyutilizes thesubprocess.runmodule to executetsharkcommands for deep packet inspection and conversation analysis. This interaction is performed using structured argument lists without a shell wrapper, effectively mitigating shell injection risks. Evidence:subprocess.run(cmd, capture_output=True, text=True)inscripts/agent.py. - [PROMPT_INJECTION]: The skill presents a surface for indirect prompt injection by processing untrusted network traffic data (PCAP files) and presenting it to the agent for analysis.
- Ingestion points: Raw packet data is ingested via
scapy.all.rdpcap()in bothscripts/agent.pyandscripts/process.py. - Boundary markers: The scripts output results in JSON format, which provides some structural separation, but no explicit delimiters or warnings are used to protect the agent from adversarial strings embedded in packet headers or payloads.
- Capability inventory: The skill has the capability to execute system commands via
tsharkand write report files to the local file system. - Sanitization: String decoding uses
errors="replace"to prevent encoding-related crashes, but no logical sanitization is performed to filter out potentially malicious language instructions contained within the analyzed traffic.
Audit Metadata