Network 101
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The skill instructs the use of sudo for several high-impact administrative tasks, including package installation (apt install), service lifecycle management (systemctl), and direct system configuration (tee, mkdir) across Apache, SNMP, and Samba services.\n- [COMMAND_EXECUTION] (MEDIUM): Modification of host-based firewall settings on both Linux (ufw allow) and Windows (New-NetFirewallRule) to open multiple network ports (80, 443, 161, 445) to inbound traffic.\n- [COMMAND_EXECUTION] (MEDIUM): Usage of chmod 777 to set world-writable and world-readable permissions on SMB file share directories (/srv/samba/share), which is a high-risk security practice.\n- [CREDENTIALS_UNSAFE] (LOW): The configuration instructions include hardcoded default SNMP community strings ('public' and 'private') which are transmitted in cleartext and represent a common security vulnerability.\n- [INDIRECT_PROMPT_INJECTION] (LOW): The skill creates a vulnerability surface by monitoring and parsing untrusted web server access logs. 1. Ingestion points: /var/log/apache2/access.log (via tail -f). 2. Boundary markers: Absent; the agent is not instructed to distinguish between log data and instructions. 3. Capability inventory: Extensive capabilities including sudo, service management, and firewall modification. 4. Sanitization: Absent; data is processed as raw text using grep and awk.
Audit Metadata