systemd
Warn
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides instructions for using
sudo systemctlto manage system services, which involves executing commands with administrative privileges. - [COMMAND_EXECUTION]: The skill guides users to create and modify unit files within
/etc/systemd/system/, which is a protected system directory requiring root access. - [CREDENTIALS_UNSAFE]: The sample service configuration references an
EnvironmentFile(e.g.,/opt/myapp/.env), which is a common location for storing sensitive credentials and environment variables. - [PROMPT_INJECTION]: The skill utilizes templates for systemd service and timer units that represent a surface for indirect prompt injection if untrusted external data is used to populate them.
- Ingestion points: Service and timer unit templates in
SKILL.md. - Boundary markers: None identified in the provided templates.
- Capability inventory: Capabilities include system-wide service management via
sudo systemctland file-writing to/etc/via shell commands. - Sanitization: No sanitization or validation of the input used to fill the templates is described.
Audit Metadata