skills/mukul975/anthropic-cybersecurity-skills/detecting-container-escape-with-falco-rules/Gen Agent Trust Hub
detecting-container-escape-with-falco-rules
Pass
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The Python scripts
scripts/agent.pyandscripts/process.pyutilize thesubprocessmodule to execute system commands includingfalco,systemctl, andkubectl. These operations are essential for the skill's purpose of managing runtime security rules and checking deployment health. Arguments are passed as lists to mitigate shell injection risks. - [EXTERNAL_DOWNLOADS]: The
SKILL.mdfile contains instructions for installing Falco and its Helm charts. These downloads target official and well-known sources such asfalco.organdfalcosecurity.github.io, following standard procedure for the deployment of this security software. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through its log parsing functionality.
- Ingestion points: The
parse_falco_alertsfunctions in bothscripts/agent.pyandscripts/process.pyread JSON event data from Falco logs. - Boundary markers: There are no boundary markers or explicit 'ignore instructions' delimiters applied to the output of these parsing scripts.
- Capability inventory: The skill possesses capabilities to execute shell commands and interact with Kubernetes clusters via
kubectlandfalcobinaries. - Sanitization: The scripts perform JSON decoding but do not sanitize the content of alert fields (such as process command lines or container names), which could contain malicious instructions injected by an attacker to influence an AI agent reading the script output.
Audit Metadata