skills/mukul975/anthropic-cybersecurity-skills/collecting-threat-intelligence-with-misp/Gen Agent Trust Hub
collecting-threat-intelligence-with-misp
Fail
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: CRITICALPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to its core functionality of processing untrusted data from external threat intelligence sources.
- Ingestion points: Data enters the agent's context through
misp.search()andmisp.feeds()calls inscripts/agent.pyandscripts/process.pywhich retrieve event descriptions and attributes from remote MISP servers and community feeds. - Boundary markers: The instructions do not define clear delimiters or provide the agent with warnings to ignore potential instructions embedded within the retrieved intelligence data.
- Capability inventory: The skill can perform file system writes (
export_csvandexport_stix2functions inscripts/process.py) and output processed data to the terminal. - Sanitization: While the scripts use structured output formats like CSV and JSON, there is no evidence of content filtering or sanitization of the natural language fields (such as event info or comments) that might contain malicious instructions.
- [EXTERNAL_DOWNLOADS]: The skill references several external threat intelligence feeds and repositories.
- Official MISP Docker repository:
https://github.com/MISP/misp-docker.git(Well-known project source). - Community feeds: Fetches data from established providers including CIRCL OSINT (
circl.lu),botvrij.eu, and URLhaus (urlhaus.abuse.ch). These are recognized industry-standard sources for threat intelligence and are treated as safe in this context. - [MALICIOUS_URL_DETECTION]: The file
assets/template.mdcontains the domainmalicious-domain.com. While automated scanners flagged this as associated with botnet activity, its placement within a 'Notable Campaigns' section of a threat intelligence report template indicates it is intended as a non-functional placeholder for illustrative purposes.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata