claude-monitor
Pass
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The scripts
health_check.py,api_bench.py, andmonitor.pyautomatically attempt to install thepsutilpackage from the Python Package Index (PyPI) if it is not found on the system. - [COMMAND_EXECUTION]: The skill uses
subprocess.check_callto execute shell commands for package installation. - [DATA_EXPOSURE]: The skill accesses detailed system information, including:
- Full process lists and their associated memory/CPU usage via
psutil.process_iter. - Local disk usage statistics for the
C:/drive. - Network interface statistics and MTU settings.
- Local file system paths which are hardcoded in the
SKILL.mdfile, revealing the author's local directory structure and username. - [INDIRECT_PROMPT_INJECTION]: The skill creates an attack surface for indirect prompt injection:
- Ingestion points:
health_check.pyandmonitor.pyread process names directly from the operating system. - Boundary markers: No delimiters or safety instructions are used when interpolating these names into reports.
- Capability inventory: The skill possesses the ability to write files to disk (
monitor_log.json) and execute subprocesses (forpipinstallation). - Sanitization: Process names and system metrics are not sanitized or validated before being included in the diagnostic summaries shown to the agent and the user.
Audit Metadata