acquiring-disk-image-with-dd-and-dcfldd

Pass

Audited by Gen Agent Trust Hub on Apr 6, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses subprocess.run with list-based arguments and shlex.split to execute forensic tools like dd and dcfldd, effectively preventing shell injection. These commands require root access to interact with hardware devices, which is the primary purpose of the skill.
  • [EXTERNAL_DOWNLOADS]: Instructions include installing the dcfldd utility via the official system package manager, which is a standard and safe practice for tool acquisition.
  • [DATA_EXFILTRATION]: The documentation includes remote imaging scenarios via ssh or netcat. This is described as a standard forensic technique for data acquisition and is not used for unauthorized exfiltration.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 6, 2026, 02:29 PM