performing-service-account-audit
Pass
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyutilizes thesubprocess.runfunction to execute external commands. - It executes
powershellwith a command to queryGet-ADUserfor service accounts, retrieving properties like SPNs, password age, and group membership. - It executes the
awsCLI (aws iam list-usersandaws iam list-access-keys) to discover IAM identities and their associated keys. - These executions are localized to the audit environment and are necessary for the skill's functionality as an identity auditing tool.
- [SAFE]: Analysis of the Python scripts (
scripts/agent.pyandscripts/process.py) confirms they perform legitimate data processing and risk assessment logic. - There is no evidence of network exfiltration (network activity is limited to the official AWS CLI tools).
- There is no obfuscation or use of suspicious encoding.
- The skill does not attempt to establish persistence or escalate privileges beyond what is required for the audit.
- [SAFE]: A minor discrepancy exists in the metadata where the
SKILL.mdlists the author as 'mahipal' while theLICENSEfile identifies 'mukul975'. This is typical of template-based skill development and does not represent a security risk.
Audit Metadata