aws-fis-experiment-execute
Pass
Audited by Gen Agent Trust Hub on May 11, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill performs extensive infrastructure operations using the AWS CLI and kubectl to manage chaos experiments.
- Evidence: Uses
aws fis start-experiment,aws fis stop-experiment, andaws cloudformation delete-stackto modify cloud resources. - Evidence: Includes shell script logic for status polling in
references/cli-commands.mdwhich executes multiple commands in a loop. - [DATA_EXFILTRATION]: The skill accesses and aggregates sensitive system and application data for reporting.
- Evidence: Utilizes
kubectl logs -fto collect real-time application logs and AWS CLI to fetch managed service logs. - Evidence: Reads environment-specific configuration and CloudFormation outputs to resolve experiment targets.
- [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface because it processes untrusted external data.
- Ingestion points: Reads experiment metadata from directory-level
README.mdfiles and analyzes application log streams. - Boundary markers: No explicit delimiters or instructions are used to prevent the agent from obeying instructions potentially embedded in logs or config files.
- Capability inventory: The agent has permissions to delete stacks, stop experiments, and execute shell commands via referenced scripts.
- Sanitization: There is no evidence of log sanitization or validation of the README content before it is used to drive the workflow.
Audit Metadata