log-analyzer
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a local shell script
{baseDir}/analyze.shto perform log parsing and statistical analysis. It takes user-provided arguments such as file paths, regex patterns, and format strings. - [COMMAND_EXECUTION]: The skill is designed to read potentially sensitive system files, specifically referencing paths like
/var/log/app.logandaccess.log. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8) because it ingests and processes untrusted data from log files.
- Ingestion points: Log files provided via the
<logfile>argument inSKILL.md. - Boundary markers: None mentioned in the skill instructions to distinguish between log data and agent instructions.
- Capability inventory: The skill executes subprocesses via
{baseDir}/analyze.shwhich may use tools likegrep,awk, orsedto process data (SKILL.md). - Sanitization: No explicit sanitization or validation of the log content is described before it is analyzed and returned to the agent context.
Audit Metadata