skills/mukul975/anthropic-cybersecurity-skills/performing-ssl-tls-inspection-configuration/Gen Agent Trust Hub
performing-ssl-tls-inspection-configuration
Warn
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The
verify_ca_deployedmethod inscripts/agent.pyis vulnerable to command injection. It uses Python f-strings to interpolate theinternal_ca_cnvariable—which is derived from command-line arguments—directly into a PowerShell command string passed tosubprocess.run. A malicious user could provide a crafted CA name (e.g., using semicolons or backticks) to execute arbitrary commands on the host system. - Evidence (scripts/agent.py):
subprocess.run(["powershell", "-NoProfile", "-Command", f'Get-ChildItem Cert:\\LocalMachine\\Root | Where-Object {{$_.Subject -like "*{self.internal_ca_cn}*"}} ...']). - [COMMAND_EXECUTION]: The skill documentation in
SKILL.mdinstructs users to perform high-privilege operations, such as usingsudo security add-trusted-certon macOS orImport-Certificatein PowerShell. These operations modify the system's Root Trust Store, which is a sensitive security configuration that should only be altered with verified and trusted certificates.
Audit Metadata