performing-automated-malware-analysis-with-cape

Pass

Audited by Gen Agent Trust Hub on Apr 10, 2026

Risk Level: SAFEDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
  • [DATA_EXFILTRATION]: The skill includes a Python script that reads local files and sends them to a remote CAPE sandbox server for analysis. This capability could be used for unauthorized data transmission if an attacker influences the file path provided to the agent.\n- [EXTERNAL_DOWNLOADS]: The skill uses the Python requests library to communicate with user-defined target servers and the CAPEv2 API to transmit data and fetch analysis reports.\n- [PROMPT_INJECTION]: The skill exhibits vulnerability surfaces for indirect prompt injection by processing external analysis results at runtime.\n
  • Ingestion points: Report data is fetched from the CAPE API in both SKILL.md and scripts/agent.py.\n
  • Boundary markers: No explicit delimiters or instructions are used to distinguish analysis data from system instructions.\n
  • Capability inventory: The skill has access to the local file system (read/write) and network (HTTP POST/GET).\n
  • Sanitization: There is no evidence of sanitization or structural validation for the information extracted from analysis reports.\n- [COMMAND_EXECUTION]: The skill provides the scripts/agent.py script and instructions for command-line interaction with the sandbox environment.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 10, 2026, 06:26 PM