Network 101
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [Privilege Escalation] (HIGH): The skill mandates the use of 'sudo' for nearly all operations, including installing packages, modifying system configuration files in /etc/, and altering firewall rules. It also explicitly uses 'chmod 777' on the Samba share directory, which is a major security risk.
- [Persistence Mechanisms] (HIGH): It uses 'systemctl enable apache2' to ensure the web server persists across system reboots, which is a common persistence technique for attackers.
- [Unverifiable Dependencies] (MEDIUM): The skill triggers the installation of several external packages (apache2, snmpd, samba, nmap) via 'apt install' without verifying specific versions or source integrity.
- [Indirect Prompt Injection] (HIGH): The skill creates a dangerous attack surface by interpolating user-provided inputs (like site names and physical paths) directly into 'sudo' shell commands. Mandatory Evidence: (1) Ingestion points: 'name' and 'physical path' inputs in Step 1. (2) Boundary markers: None present. (3) Capability inventory: Full root access via 'sudo', service management, and firewall control. (4) Sanitization: None identified; inputs are passed directly to shell commands.
Recommendations
- AI detected serious security threats
Audit Metadata