ctf-forensics

Pass

Audited by Gen Agent Trust Hub on Apr 22, 2026

Risk Level: SAFE
Full Analysis
  • [COMMAND_EXECUTION]: The skill provides numerous commands for forensic analysis using established tools like Volatility 3, Tshark/Wireshark, Binwalk, and Sleuth Kit. These are used for legitimate diagnostic and recovery purposes within the stated scope of CTF forensics.
  • [EXTERNAL_DOWNLOADS]: The documentation references and provides instructions for installing various specialized tools and libraries (e.g., heatshrink2, femtozip, keepass2john). These sources are well-known in the security community or are official package registries.
  • [DATA_EXPOSURE]: The skill frequently references sensitive file paths such as SAM/SYSTEM hives, SSH keys, and environment variables. However, these references are contextually appropriate as they describe evidence extraction from forensic images provided in a challenge, rather than attempting to access the host system's credentials.
  • [INDIRECT_PROMPT_INJECTION]: The skill is designed to ingest and process untrusted external data (forensic evidence like PCAPs and disk images). While this constitutes an attack surface, the skill serves as a reference guide for analytical workflows and does not inherently facilitate the execution of instructions embedded in that data. Evidence of this surface includes:
  • Ingestion points: Processes external files like .dd, .pcap, and .vmem (SKILL.md, references/disk-and-memory.md).
  • Boundary markers: Absent (Standard for a reference guide).
  • Capability inventory: Extensive use of shell commands and Python execution (SKILL.md, references/*.md).
  • Sanitization: Not applicable for a documentation-based skill.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 22, 2026, 07:57 AM