ssh-tunnel-debug
Pass
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (SAFE): The skill performs extensive shell operations including process management (
pkill,pgrep), service management (launchctl), and network diagnostics (ssh,curl,nc,ping,lsof). These are necessary for the primary purpose of debugging SSH tunnels. - [DATA_EXFILTRATION] (SAFE): While the skill uses network-capable tools, there is no evidence of sensitive data being exfiltrated to unauthorized domains. Connectivity tests are directed at the user's specified hosts or localhost.
- [PRIVILEGE_ESCALATION] (SAFE): The skill interacts with user-level LaunchAgents and process lists. It suggests using the
rootuser for remote SSH connections as a troubleshooting step, but does not attempt local privilege escalation (e.g.,sudo). - [INDIRECT_PROMPT_INJECTION] (LOW): The skill processes untrusted data from external sources.
- Ingestion points: The agent reads output from
ssh-tunnels logsand remote command execution results viassh(e.g.,netstatoutput from the remote host). - Boundary markers: No explicit delimiters or instructions are provided to the agent to treat this external data as untrusted text.
- Capability inventory: The skill can execute arbitrary bash commands, manage system services via
launchctl, and kill processes viapkill. - Sanitization: No sanitization or validation of the ingested log content or remote command output is performed before it is processed by the agent's logic.
Audit Metadata