networking-config
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- COMMAND_EXECUTION (HIGH): The script
scripts/create-vpc.shinterpolates positional parameters ($1, $2) directly into thedoctlcommand. This creates an Indirect Prompt Injection surface where malicious input provided to the agent could be used to inject additional command flags or execute arbitrary shell commands. 1. Ingestion point: scripts/create-vpc.sh lines 7-8. 2. Boundary markers: None. 3. Capability: Infrastructure creation viadoctl. 4. Sanitization: None. - COMMAND_EXECUTION (MEDIUM): The firewall template
templates/firewall-rules.jsonconfigures port 22 (SSH) to be open to0.0.0.0/0. This allows global access to instances, violating the principle of least privilege and increasing the risk of brute-force attacks.
Recommendations
- AI detected serious security threats
Audit Metadata