sre-engineer
Warn
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides Python templates that execute arbitrary shell commands using
subprocess.runwithshell=Trueinside theAutomatedRunbookclass. This pattern is inherently risky as it allows for command injection if the command strings are constructed from untrusted input. - Evidence:
references/automation-toil.mdcontainssubprocess.run(step.command, shell=True, ...). - [COMMAND_EXECUTION]: The skill demonstrates and encourages the use of powerful system and cluster management tools such as
kubectl,systemctl,tc, andiptablesfor automated remediation and chaos engineering. - Evidence:
SKILL.mduseskubectl rollout restart.references/automation-toil.mdusessystemctl restartanddf.references/incident-chaos.mdusestcfor latency injection andiptablesviakubectl exec. - [COMMAND_EXECUTION]: Potential for Indirect Prompt Injection (Category 8) where untrusted metadata or parameters could be used to manipulate shell commands.
- Ingestion points: CLI arguments (
sys.argv) inSKILL.mdand user-definedRunbookStepobjects inreferences/automation-toil.md. - Boundary markers: None present; data is directly interpolated into command strings.
- Capability inventory:
subprocess.runis used extensively acrossSKILL.md,references/automation-toil.md, andreferences/incident-chaos.mdto perform file operations, network configuration, and container management. - Sanitization: No evidence of input validation or escaping before passing data to shell execution functions.
Audit Metadata