skills/mukul975/anthropic-cybersecurity-skills/performing-memory-forensics-with-volatility3-plugins/Gen Agent Trust Hub
performing-memory-forensics-with-volatility3-plugins
Pass
Audited by Gen Agent Trust Hub on Apr 11, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The Python scripts (
SKILL.md,scripts/agent.py, andscripts/process.py) use thesubprocess.runfunction to execute Volatility3 commands. The execution is implemented securely by passing arguments as a list and avoiding the use ofshell=True, which prevents shell injection vulnerabilities when handling user-provided file paths for memory dumps. - [DATA_EXFILTRATION]: There is no evidence of unauthorized data transmission. The skill processes local forensic artifacts and outputs analysis results to the standard output or local files as requested by the user.
- [PROMPT_INJECTION]: The skill instructions and metadata are focused on technical forensic workflows and do not contain any patterns designed to override agent behavior, bypass safety guidelines, or extract system prompts.
- [EXTERNAL_DOWNLOADS]: The skill references the
volatility3package and official documentation from the Volatility Foundation and MITRE ATT&CK. These are well-known, reputable sources within the cybersecurity community, and the skill correctly instructs users to manage dependencies via standard package managers.
Audit Metadata