security-posture-analyzer
Pass
Audited by Gen Agent Trust Hub on Mar 3, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill's metadata defines a
PostToolUsehook that executes a local shell script located at../../../hooks/skills/post_output_validation_hook.sh. This script is triggered whenever theReadtool is used to validate output. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests and processes data from untrusted external sources.
- Ingestion points: The skill reads
http_signals(HTTP headers, CSP policies),dns_signals(SPF, DMARC, DKIM records), and the content ofsecurity.txtfiles from external domains. - Boundary markers: No explicit boundary markers or instructions to ignore embedded commands are present in the analysis logic.
- Capability inventory: The skill has access to the
ReadandGreptools, as well as the ability to execute a validation script via hooks. - Sanitization: The provided analysis logic extracts and parses fields using regular expressions but does not perform sanitization to prevent the LLM from interpreting instructions that might be hidden within the external data (e.g., within a CSP header or a security contact field).
Audit Metadata