agent-session-monitor
Pass
Audited by Gen Agent Trust Hub on Mar 19, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
main.pyscript usesos.systemto execute terminal clear commands for its real-time monitor display. - [DATA_EXFILTRATION]: The skill accesses system-level logs in
/var/logcontaining conversation history and stores them in local JSON files. - [DATA_EXFILTRATION]: The
webserver.pyscript hosts an unauthenticated web server on0.0.0.0, potentially exposing session data to the local network. - [DATA_EXFILTRATION]: The web server in
scripts/webserver.pyuses theidparameter to construct file paths without sanitization (e.g.,self.data_dir / f"{session_id}.json"), allowing potential access to any JSON file on the system. - [PROMPT_INJECTION]: The skill processes logs containing user-supplied content, creating an indirect prompt injection surface if this data is consumed by other agents. * Ingestion points:
main.pyparses conversation data from Higress access logs. * Boundary markers: Data is parsed into structured JSON format. * Capability inventory: The skill performs file writes (main.py), hosts an HTTP server (webserver.py), and executes shell commands (os.systeminmain.py). * Sanitization: Basic HTML escaping is performed in the web UI, but JSON API responses are served without additional sanitization.
Audit Metadata