fortify-onprem
Pass
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it retrieves and processes untrusted data from external Fortify Software Security Center (SSC) servers, including vulnerability descriptions, audit history, and AI-generated remediation advice from 'Fortify Aviator'. \n- Ingestion points: Data enters the context via tools such as
fcli_ssc_issue_listandfcli_ssc_appversion_get, specifically when retrieving issue details and comments as described inreferences/provide-recommendations.md. \n- Boundary markers: There are no explicit delimiters or instructions provided to the agent to treat the ingested data as untrusted or to ignore embedded commands. \n- Capability inventory: The skill enables the agent to execute a wide range of shell commands through thefclitoolset, including scan management and file packaging. \n- Sanitization: No sanitization or validation of server-provided strings is performed before the agent presents the content to the user or acts upon it.\n- [COMMAND_EXECUTION]: The skill utilizes thefclicommand-line interface to interact with Fortify products. It performs standard operations such as listing applications, counting issues, and managing scans based on user requests.\n- [EXTERNAL_DOWNLOADS]: The skill facilitates the download of ScanCentral client components using thefcli_ssc_action_packagetool when the--sc-client-versionparameter is set to 'latest'. This is a standard administrative functionality for maintaining tool compatibility with the server infrastructure.
Audit Metadata