performing-vlan-hopping-attack
Pass
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses system commands to configure network interfaces and manage kernel modules.
- Evidence: In
scripts/agent.py, thecreate_vlan_interfaceandcleanup_vlan_interfacesfunctions usesubprocess.runto callmodprobe 8021qandip linkfor interface creation and deletion. - [EXTERNAL_DOWNLOADS]: The skill requires and references well-known external networking libraries and tools.
- Evidence: The script
scripts/agent.pydepends on thescapylibrary. The documentation inSKILL.mdidentifiesYersiniaandfroggeras prerequisites for the assessment workflow. - [PROMPT_INJECTION]: The skill contains an attack surface for indirect prompt injection by ingesting data from the local network environment.
- Ingestion points: The
listen_for_dtpandlisten_for_cdp_lldpfunctions inscripts/agent.pycapture network packets usingscapy.sniff(). - Boundary markers: Absent. Captured data from packet headers is extracted and included directly in the report objects without delimiters or warnings.
- Capability inventory: The script has capabilities for raw packet crafting, interface manipulation, and executing system commands via
subprocess.runacross multiple functions. - Sanitization: Absent. There is no validation or escaping of the data captured from the network before it is processed and displayed in the final assessment report.
Audit Metadata