skills/aliyun/alibabacloud-aiops-skills/alibabacloud-waf-checkresponse-intercept-query/Gen Agent Trust Hub
alibabacloud-waf-checkresponse-intercept-query
Pass
Audited by Gen Agent Trust Hub on May 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes the
aliyunCLI to interact with Alibaba Cloud WAF and SLS services. These calls are implemented securely inscripts/get_waf_logs.pyusing argument lists withsubprocess.run, which prevents command injection. - [DATA_EXFILTRATION]: The skill retrieves log entries but includes robust logic in the Python script to mask sensitive fields, including IP addresses, User-Agents, and URI query parameters, ensuring that PII is protected in the analysis report. No exfiltration to external third-party domains is performed.
- [CREDENTIALS_UNSAFE]: No hardcoded credentials are used. The skill is designed to use the default Alibaba Cloud authentication chain, such as local configuration files or RAM roles.
- [PROMPT_INJECTION]: The skill processes user-provided inputs like the Request ID. It implements strong validation via regex (
^[a-zA-Z0-9-]{1,128}$) inscripts/get_waf_logs.pyand emphasizes manual confirmation for rule status changes. - Ingestion points: User-provided Request ID and automated SLS log retrieval.
- Boundary markers: Delimiters are not explicitly used in prompts, but input is strictly typed and validated.
- Capability inventory: Execution of
aliyunCLI for log queries and WAF rule status modification. - Sanitization: Use of regex-based allow-lists for all dynamic input parameters.
Audit Metadata