dhcp

Pass

Audited by Gen Agent Trust Hub on Mar 18, 2026

Risk Level: SAFE
Full Analysis
  • [PROMPT_INJECTION]: The skill interacts with DHCP lease files, creating a surface for potential indirect prompt injection.
  • Ingestion points: File paths /var/lib/dhcpd/dhcpd.leases and /var/lib/kea/kea-leases4.csv contain data supplied by network clients (e.g., hostnames).
  • Boundary markers: No delimiters are specified to separate untrusted client data from agent instructions.
  • Capability inventory: The skill can manage system services via systemctl, modify firewall rules with ufw and firewall-cmd, and read system files.
  • Sanitization: No explicit sanitization or validation of client-supplied strings is documented.
  • [COMMAND_EXECUTION]: The skill provides numerous commands for network and service administration that require elevated privileges.
  • Evidence: Administrative commands like systemctl restart, sudo ufw allow, and direct manipulation of configuration files in /etc/dhcp/ and /etc/kea/ are standard for the DHCP server management use-case.
  • [SAFE]: The documentation includes a dedicated section regarding the EOL status of ISC DHCP, advising users to transition to Kea for continued security support.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 18, 2026, 01:37 PM