performing-ot-vulnerability-assessment-with-claroty

Pass

Audited by Gen Agent Trust Hub on Apr 7, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The skill fetches the Known Exploited Vulnerabilities (KEV) catalog from the Cybersecurity and Infrastructure Security Agency's (CISA) official domain. This is a trusted government source used for correlating asset data with globally recognized threats.- [COMMAND_EXECUTION]: Includes a Python-based command-line agent (agent.py) designed to facilitate interaction with the Claroty xDome API. The script utilizes standard arguments for automation and is consistent with administrative security tooling.- [DATA_EXFILTRATION]: Performs legitimate network operations to retrieve vulnerability data from CISA and a user-configured Claroty endpoint. These operations are required for the skill's primary function and do not involve unauthorized access to sensitive local files or credentials.- [SAFE]: The risk scoring logic is transparent and correctly incorporates industrial security concepts such as Purdue Levels and asset criticality. The code follows security best practices, including the use of session management and timeouts for network requests.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 7, 2026, 12:57 PM