skills/mukul975/anthropic-cybersecurity-skills/performing-network-traffic-analysis-with-zeek/Gen Agent Trust Hub
performing-network-traffic-analysis-with-zeek
Pass
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The file
scripts/agent.pyimplements PCAP processing by invoking thezeekbinary throughsubprocess.run. The command is constructed as a list of strings without the use ofshell=True, which effectively mitigates common shell injection risks associated with user-supplied file paths or directory names.\n- [EXTERNAL_DOWNLOADS]: TheSKILL.mdfile contains instructions for adding the Zeek repository and installing the software from the openSUSE build service and Ubuntu package manager. These are standard and trusted distribution channels for the tools described in the skill.\n- [PROMPT_INJECTION]: The skill has a vulnerability surface for indirect prompt injection because it ingests data from untrusted network connections and maintains system capabilities.\n - Ingestion points: The agent in
scripts/agent.pyreads and parses TSV log files generated from network traffic, which includes attacker-influenced fields like DNS queries, HTTP URIs, and User-Agents.\n - Boundary markers: The output returned by the agent is structured as JSON but does not incorporate explicit boundary markers or instructions that would prevent a language model from interpreting embedded directives as its own instructions.\n
- Capability inventory: The
scripts/agent.pyscript includes functional code to execute system commands via thesubprocessmodule to process PCAP files.\n - Sanitization: The log parser in
scripts/agent.pyusesPath.read_text(errors='replace')for basic character encoding robustness but lacks specific sanitization or filtering logic to neutralize malicious instructions embedded in network metadata.
Audit Metadata