skills/mukul975/anthropic-cybersecurity-skills/performing-service-account-credential-rotation/Gen Agent Trust Hub
performing-service-account-credential-rotation
Pass
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: SAFECREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: Potential exposure of sensitive tokens through command-line arguments. In
scripts/agent.py, themainfunction retrieves thevault_tokenfromsys.argv[2], which can make the token visible to other users on the system via process monitoring tools likeps. Best practice involves using environment variables or a secure configuration file.\n- [COMMAND_EXECUTION]: Use of subprocess calls to interact with cloud providers. The scriptscripts/agent.pyusessubprocess.runto executeaws iamandaz ad appcommands for credential management. While this is the intended behavior, it requires the environment to be properly secured.\n- [COMMAND_EXECUTION]: Dynamic SQL construction inscripts/process.py. Therotate_database_passwordmethod uses f-string interpolation to buildALTER USERSQL statements. This represents a potential SQL injection surface if the account names were sourced from untrusted or external inputs, although they appear to be internal configuration here.
Audit Metadata