skills/mukul975/anthropic-cybersecurity-skills/performing-automated-malware-analysis-with-cape/Gen Agent Trust Hub
performing-automated-malware-analysis-with-cape
Pass
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: SAFEDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: The skill includes a Python script that reads local files and sends them to a remote CAPE sandbox server for analysis. This capability could be used for unauthorized data transmission if an attacker influences the file path provided to the agent.\n- [EXTERNAL_DOWNLOADS]: The skill uses the Python requests library to communicate with user-defined target servers and the CAPEv2 API to transmit data and fetch analysis reports.\n- [PROMPT_INJECTION]: The skill exhibits vulnerability surfaces for indirect prompt injection by processing external analysis results at runtime.\n
- Ingestion points: Report data is fetched from the CAPE API in both
SKILL.mdandscripts/agent.py.\n - Boundary markers: No explicit delimiters or instructions are used to distinguish analysis data from system instructions.\n
- Capability inventory: The skill has access to the local file system (read/write) and network (HTTP POST/GET).\n
- Sanitization: There is no evidence of sanitization or structural validation for the information extracted from analysis reports.\n- [COMMAND_EXECUTION]: The skill provides the
scripts/agent.pyscript and instructions for command-line interaction with the sandbox environment.
Audit Metadata