skills/mukul975/anthropic-cybersecurity-skills/acquiring-disk-image-with-dd-and-dcfldd/Gen Agent Trust Hub
acquiring-disk-image-with-dd-and-dcfldd
Pass
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
subprocess.runwith list-based arguments andshlex.splitto execute forensic tools likeddanddcfldd, effectively preventing shell injection. These commands require root access to interact with hardware devices, which is the primary purpose of the skill. - [EXTERNAL_DOWNLOADS]: Instructions include installing the
dcflddutility via the official system package manager, which is a standard and safe practice for tool acquisition. - [DATA_EXFILTRATION]: The documentation includes remote imaging scenarios via
sshornetcat. This is described as a standard forensic technique for data acquisition and is not used for unauthorized exfiltration.
Audit Metadata