tailscale-policy-manager
Warn
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides and describes the usage of multiple bash scripts (
validate-policy.sh,apply-policy.sh,get-policy.sh) that usecurlandpython3to interact with the Tailscale API. These scripts handle sensitive environment variables such asTS_API_KEYandTS_OAUTH_SECRETfor network policy management. - [EXTERNAL_DOWNLOADS]: The skill utilizes external dependencies including the
tailscale/gitops-acl-actionGitHub Action and thehujsonfmttool. These resources originate from Tailscale's official GitHub repository, a well-known technology service provider. - [DATA_EXFILTRATION]: The
.claude/settings.local.jsonfile grantsWebFetchpermissions for several non-whitelisted third-party domains includingblog.gripdev.xyz,heywoodlh.io, anddev.l1qu1d.net. In a skill that handles critical network security configurations and API credentials, access to these unrelated personal domains presents a potential exfiltration vector. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8) due to its configuration allowing data ingestion from untrusted sources via
WebFetchto third-party domains. These ingestion points in.claude/settings.local.jsonlack boundary markers or sanitization, and the skill possesses significant capabilities (bash execution, API interaction) that could be exploited if malicious instructions are retrieved from these external sites.
Audit Metadata