skills/mukul975/anthropic-cybersecurity-skills/performing-wireless-security-assessment-with-kismet/Gen Agent Trust Hub
performing-wireless-security-assessment-with-kismet
Pass
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: SAFECOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The documentation in
SKILL.mdincludes instructions to execute high-privilege commands usingsudo. These are required for managing wireless interfaces (e.g.,sudo iw dev wlan0 set type monitor) and starting the Kismet service (sudo kismet -c wlan0). - [CREDENTIALS_UNSAFE]: Both the documentation in
SKILL.mdand the Python agent inscripts/agent.pyutilize hardcoded default credentials (kismet/kismet) for authenticating with the Kismet REST API. While standard for the tool, these should be modified in operational environments. - [PROMPT_INJECTION]: The skill processes untrusted external data such as SSIDs and device names, which creates a surface for indirect prompt injection.
- Ingestion points: Data is collected from the Kismet API in
scripts/agent.pyand from SQLite databases inSKILL.md. - Boundary markers: No delimiters or specialized instructions are used to separate external data from the agent's logic.
- Capability inventory: The skill performs system-level network configuration via
sudoand uses therequestslibrary for network communication. - Sanitization: There is no evidence of validation or sanitization of wireless metadata before it is printed or processed by the analysis scripts.
Audit Metadata