skills/mukul975/anthropic-cybersecurity-skills/analyzing-network-traffic-with-wireshark/Gen Agent Trust Hub
analyzing-network-traffic-with-wireshark
Warn
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/agent.pyscript executes thetsharkutility usingsubprocess.run(). Several functions build command arguments using string formatting. Althoughshlex.split()is applied to the arguments, the lack of strict validation for parameters likedisplay_filter,conv_type, oroutput_dircreates a surface for argument injection. This could be leveraged to execute unauthorized tshark operations, such as loading malicious Lua scripts via the-Xflag. \n- [DATA_EXFILTRATION]: The skill enables the extraction of sensitive network data.SKILL.mdandscripts/agent.pydescribe procedures for harvesting cleartext credentials (e.g., FTP/HTTP auth) and exporting objects (files) from protocols like HTTP and SMB. This capability could be abused for data theft if the agent is compromised. \n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes packet captures (PCAPs) from untrusted external sources. Malicious packets could contain text designed to influence the agent's analysis reports or subsequent logic. \n - Ingestion points: PCAP files are read using
tshark -rinscripts/agent.py. \n - Boundary markers: No markers are used to distinguish between extracted packet data and analysis instructions. \n
- Capability inventory: The agent has the ability to execute commands and perform file system operations. \n
- Sanitization: No content-level sanitization is performed on data extracted from network packets before it is processed by the agent.
Audit Metadata