dd-audit
Pass
Audited by Gen Agent Trust Hub on May 8, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests and processes audit log data from external sources (Datadog Audit Trail) which can contain attacker-controlled content.
- Ingestion points: Data enters the context via
pup audit-logs searchcommands inSKILL.md,ai-activity-audit/SKILL.md,security-investigation/SKILL.md,key-compromise/SKILL.md, andcompliance-report/SKILL.md. - Boundary markers: Absent. The instructions do not provide delimiters or warnings to ignore embedded instructions within the log data.
- Capability inventory: The skill executes shell commands (
pup,curl,jq), performs network operations to external APIs, and has the capability to delete API keys (pup api-keys delete). - Sanitization: Absent. There is no evidence of filtering or escaping external content before interpolation into the agent's context.
- [COMMAND_EXECUTION]: The skill relies on shell command execution for its core functionality.
- Evidence: Multiple bash snippets across all sub-skills using
pup,curl, andjq. This includes potentially destructive operations likepup api-keys deletefor key compromise remediation. - [DATA_EXFILTRATION]: The skill transmits sensitive authentication tokens (
DD_API_KEY,DD_APP_KEY) via curl to an endpoint constructed from theDD_SITEenvironment variable. While the default is an official service, the use of a variable for the domain allows for potential redirection if the agent is manipulated into changing its value. - Evidence:
curl -s -G "https://api.${DD_SITE}/api/v2/usage/hourly_usage"incost-spike-investigation/SKILL.md.
Audit Metadata