skills/mukul975/anthropic-cybersecurity-skills/implementing-ransomware-kill-switch-detection/Gen Agent Trust Hub
implementing-ransomware-kill-switch-detection
Warn
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The
agent.pyscript executes PowerShell commands viasubprocess.runto interact with the Windows operating system for mutex management. - Evidence:
check_mutex_exists_windowsandcreate_mutex_windowsfunctions inscripts/agent.py. - [REMOTE_CODE_EXECUTION]: The PowerShell command strings are constructed using direct string interpolation of the
mutex_namevariable, leading to a potential command injection vulnerability. - Evidence: In
scripts/agent.py, the variableps_scriptis built usingf'try {{ $m = [System.Threading.Mutex]::OpenExisting("{mutex_name}"); ...'. - Risk: If an attacker provides a crafted mutex name (e.g., through a malicious malware sample analysis request), they could execute arbitrary shell commands on the host system.
- [EXTERNAL_DOWNLOADS]: The skill references several external resources for threat intelligence and malware analysis.
- Evidence: References to VirusTotal, ANY.RUN, and the community-maintained
albertzsigovits/malware-mutexrepository on GitHub inSKILL.mdandreferences/api-reference.md. These are well-known technology and research services. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to its processing of untrusted data (ransomware indicators) without sanitization.
- Ingestion points: The
mutex_nameanddomainparameters inscripts/agent.pywhich may be populated from external malware samples or analysis reports. - Boundary markers: Absent. Data is interpolated directly into command strings and logic.
- Capability inventory: Shell command execution via
subprocess.runand DNS resolution viasocket.gethostbynameinscripts/agent.py. - Sanitization: Absent. The script performs no validation or escaping of the input variables before use.
Audit Metadata