hermes-attestation-guardian
Warn
Audited by Gen Agent Trust Hub on May 15, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill interacts with the system's task scheduler using the
crontabutility. Thelib/cron.mjsmodule implements logic to list and update crontab entries for the current user. - [COMMAND_EXECUTION]: Persistence is established through
scripts/setup_attestation_cron.mjsandscripts/setup_advisory_check_cron.mjs, which install recurring scripts into the crontab. These entries are managed within specific comment blocks (# >>> ... >>>) to ensure they can be updated or removed safely. - [EXTERNAL_DOWNLOADS]: The skill fetches remote advisory data from
https://clawsec.prompt.security/advisories/feed.jsonusing therefresh_advisory_feed.mjsscript. It also provides instructions inSKILL.mdto download release artifacts from the author's GitHub repository. Both sources are associated with the skill's vendor infrastructure. - [PROMPT_INJECTION]: The ingestion of external advisory feeds creates a potential surface for indirect prompt injection.
- Ingestion points: Advisory data is fetched from remote URLs in
lib/feed.mjsandscripts/refresh_advisory_feed.mjs. - Boundary markers: The skill employs JSON schema validation and Ed25519 signature verification to validate the integrity and authenticity of the ingested feeds before processing.
- Capability inventory: The skill possesses the capability to modify the system crontab and write files within the user's
~/.hermesdirectory. - Sanitization: External JSON data is validated against a strictly defined schema in
isValidFeedPayload, and cryptographic signatures are verified usingverifySignedPayloadbefore data influences system state.
Audit Metadata