dhcp
Pass
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: SAFE
Full Analysis
- [PROMPT_INJECTION]: The skill interacts with DHCP lease files, creating a surface for potential indirect prompt injection.
- Ingestion points: File paths
/var/lib/dhcpd/dhcpd.leasesand/var/lib/kea/kea-leases4.csvcontain data supplied by network clients (e.g., hostnames). - Boundary markers: No delimiters are specified to separate untrusted client data from agent instructions.
- Capability inventory: The skill can manage system services via
systemctl, modify firewall rules withufwandfirewall-cmd, and read system files. - Sanitization: No explicit sanitization or validation of client-supplied strings is documented.
- [COMMAND_EXECUTION]: The skill provides numerous commands for network and service administration that require elevated privileges.
- Evidence: Administrative commands like
systemctl restart,sudo ufw allow, and direct manipulation of configuration files in/etc/dhcp/and/etc/kea/are standard for the DHCP server management use-case. - [SAFE]: The documentation includes a dedicated section regarding the EOL status of ISC DHCP, advising users to transition to Kea for continued security support.
Audit Metadata