skills/mukul975/anthropic-cybersecurity-skills/detecting-arp-poisoning-in-network-traffic/Gen Agent Trust Hub
detecting-arp-poisoning-in-network-traffic
Pass
Audited by Gen Agent Trust Hub on Apr 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes system commands to perform network environment checks.
- The script
scripts/agent.pycalls the systemarp -autility usingsubprocess.runto inspect the local ARP cache for duplicate IP mappings. - The
SKILL.mdfile provides code snippets that usesubprocess.Popento invoketcpdumpfor packet capture and real-time analysis. - [EXTERNAL_DOWNLOADS]: The instructions and scripts reference the use of reputable third-party security software.
- The skill documentation recommends installing the
scapyPython library for packet manipulation. - It also guides the user through the installation of the
arpwatchutility using the standard system package manager (apt). - [PROMPT_INJECTION]: The skill is designed to ingest and process untrusted network data, creating a surface for potential indirect prompt injection.
- Ingestion points: The skill reads PCAP files using Scapy and processes the
/var/lib/arpwatch/arp.datlog file. - Capability inventory: The agent has the ability to execute network commands and read system-level ARP tables.
- Boundary markers: The skill does not use specific delimiters or markers when processing external packet data.
- Sanitization: Data ingested from packets is treated as structured network protocol fields and is not used to dynamically construct shell commands or LLM prompts, effectively mitigating the risk of instructions embedded in the network traffic being executed.
Audit Metadata