networking-config

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
  • COMMAND_EXECUTION (HIGH): The script scripts/create-vpc.sh interpolates positional parameters ($1, $2) directly into the doctl command. This creates an Indirect Prompt Injection surface where malicious input provided to the agent could be used to inject additional command flags or execute arbitrary shell commands. 1. Ingestion point: scripts/create-vpc.sh lines 7-8. 2. Boundary markers: None. 3. Capability: Infrastructure creation via doctl. 4. Sanitization: None.
  • COMMAND_EXECUTION (MEDIUM): The firewall template templates/firewall-rules.json configures port 22 (SSH) to be open to 0.0.0.0/0. This allows global access to instances, violating the principle of least privilege and increasing the risk of brute-force attacks.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 12:44 PM