skills/mukul975/anthropic-cybersecurity-skills/implementing-image-provenance-verification-with-cosign/Gen Agent Trust Hub
implementing-image-provenance-verification-with-cosign
Pass
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The Python scripts
scripts/agent.pyandscripts/process.pyusesubprocess.runto call thecosignCLI tool. - Arguments are passed as a list rather than a single string, which prevents shell-based command injection.
- The execution is constrained to the
cosignbinary and is necessary for the skill's primary functionality of signing and verifying images. - [EXTERNAL_DOWNLOADS]: The
SKILL.mdfile contains instructions for downloading thecosignbinary directly from its official GitHub releases repository (sigstore/cosign). - This source is a well-known and trusted repository for security tooling.
- [COMMAND_EXECUTION]: Installation steps in
SKILL.mdinclude shell commands requiring administrative privileges (sudo mv,sudo chmod) to install the binary to system paths. - These instructions are for manual user execution and represent standard installation procedures for system-level CLI tools.
- [COMMAND_EXECUTION]: The script
scripts/process.pyprocesses image lists provided via external files, which are then used in command execution. - Ingestion points: Image references are read from a file via
Path(args.images_file).read_text()inscripts/process.py. - Boundary markers: No explicit boundary markers or 'ignore' instructions are used for the input data.
- Capability inventory: The script uses
subprocess.runto execute commands andPath.write_textto generate reports. - Sanitization: No explicit sanitization is performed on image strings before they are passed as arguments; however, the use of argument lists in
subprocess.runprevents traditional shell injection.
Audit Metadata