implementing-microsegmentation-with-guardicore

Pass

Audited by Gen Agent Trust Hub on Apr 20, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
  • [EXTERNAL_DOWNLOADS]: Downloads security agent installation binaries from Akamai's official Guardicore management domain (management.guardicore.com), which is a well-known service provided by Akamai.
  • [COMMAND_EXECUTION]: Performs host-level operations to install and configure microsegmentation agents.
  • Executes downloaded scripts with sudo privileges to install kernel-level or process-level monitoring agents.
  • Deploys Kubernetes DaemonSets with full host access (privileged: true, hostNetwork: true, hostPID: true) to monitor host traffic and processes.
  • The scripts/agent.py audit script uses subprocess.run to execute curl for interacting with the Guardicore API.
  • [CREDENTIALS_UNSAFE]: The Python audit tool accepts API passwords as command-line arguments, which may result in sensitive information being visible in system process lists (e.g., via the ps command).
  • [CREDENTIALS_UNSAFE]: The audit script includes the -k (insecure) flag in its curl requests, which disables SSL certificate validation and could allow for traffic interception in hostile network environments.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 20, 2026, 11:33 PM