debug-rhel

Warn

Audited by Snyk on Mar 12, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill explicitly SSHs to user-provided remote hosts and ingests/analyses their outputs (e.g., Phase 3 systemctl status, Phase 4 journalctl logs, Phase 5 ausearch AVC denials, and Phase 6 firewall-cmd results) and uses that untrusted, user-generated content to drive diagnosis and recommended commands, so third-party content could indirectly influence agent actions.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly requires sudo on the target and instructs the agent to run privileged commands that change system state (systemctl restarts, semanage/restorecon, setsebool, firewall-cmd, etc.), which are actions that modify the machine and can compromise its state.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 12, 2026, 04:04 PM
Issues
2