skills/mukul975/anthropic-cybersecurity-skills/performing-threat-emulation-with-atomic-red-team/Gen Agent Trust Hub
performing-threat-emulation-with-atomic-red-team
Warn
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/agent.pyexecutes shell commands defined in external YAML files usingsubprocess.runwithshell=True. This occurs in theexecute_atomic_manualandrun_cleanupfunctions. - [REMOTE_CODE_EXECUTION]: The skill's primary workflow involves downloading (cloning) the
atomic-red-teamrepository and then executing the attack simulation scripts contained within. This constitutes the execution of code from an external source. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection if an attacker influences the content of the YAML files being processed, as the agent will execute the commands defined in those files.
- Ingestion points:
scripts/agent.pyloads YAML definitions from a user-specified or default directory (./atomic-red-team/atomics). - Boundary markers: No boundary markers are present to distinguish between benign data and instructions within the YAML files.
- Capability inventory: The skill has full capability to execute arbitrary shell commands via
subprocess.runand perform filesystem operations. - Sanitization: The script uses
shlex.quoteto sanitize individual input arguments before they are interpolated into the command string, providing partial protection against argument injection but not against malicious base commands.
Audit Metadata