configure-log-aggregation
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill configuration and examples fetch official Docker images (grafana/loki and grafana/promtail) from Docker Hub, which is a well-known and trusted source for these services.
- [COMMAND_EXECUTION]: The skill utilizes the
Bashtool to perform standard operational tasks, including service deployment via Docker Compose, log inspection usingdocker logs, and health monitoring of local services usingcurl. - [PROMPT_INJECTION]: The skill establishes an attack surface for indirect prompt injection as it is designed to ingest and process untrusted data from external sources.
- Ingestion points: Promtail is configured in
references/EXAMPLES.mdto scrape system logs from/var/log/, container logs via the Docker socket, and Kubernetes pod logs. - Boundary markers: Log entries are processed through
pipeline_stagesusing JSON and regex parsing to extract specific labels, providing structured boundaries for metadata. - Capability inventory: The skill allows the use of
Bash,Read,Write,Edit,Grep, andGlobtools for configuration and troubleshooting. - Sanitization: While labels are extracted and validated via regex, the raw log message content is passed through to the storage backend without inherent sanitization, which is typical for log aggregation tools.
Audit Metadata