process-cleanup
Warn
Audited by Gen Agent Trust Hub on Mar 19, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script executes the
procsCLI tool to gather process data and utilizesos.popenwithin a Python subprocess to re-verify process states. - [EXTERNAL_DOWNLOADS]: The skill documentation and script error messages reference the
procsutility from thedalance/procsrepository. - [COMMAND_EXECUTION]: The helper script uses
python3 -cto execute a block of logic where internal shell variables are interpolated directly into the Python source code string. - [PROMPT_INJECTION]: The skill processes data from the system's process list. The lack of sanitization when displaying process commands represents an indirect prompt injection surface.
- Ingestion points: JSON output from the
procscommand inscripts/kill-zombies.sh. - Boundary markers: Absent.
- Capability inventory: Process signaling via
os.killand command execution viaos.popeninscripts/kill-zombies.sh. - Sanitization: None.
Audit Metadata