configuration-management
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTION
Full Analysis
- [Data Exposure & Exfiltration] (HIGH): The file
assets/ansible-patterns.yamlreferences the sensitive file path~/.ssh/deploy_keyin its inventory templates. While used as a pattern, this points to highly sensitive credential locations. - [Indirect Prompt Injection] (HIGH): The skill is designed to process and validate infrastructure-as-code (Ansible playbooks), which can contain malicious instructions. The skill lacks boundary markers or sanitization to prevent these instructions from influencing the agent's operations.
- Ingestion points:
scripts/validate_playbook.sh(via argument),scripts/config_checker.py(via path input) - Boundary markers: Absent
- Capability inventory: Shell execution via
ansible-playbookandansible-lint - Sanitization: Absent; input is passed directly to shell commands.
- [Unverifiable Dependencies & Remote Code Execution] (HIGH): The script
scripts/validate_playbook.shdoes not sanitize the input$1before passing it toansible-playbook. This allows for argument injection, where a malicious file name could include flags that execute arbitrary code or exfiltrate data.
Recommendations
- AI detected serious security threats
Audit Metadata