log-evasion
Fail
Audited by Gen Agent Trust Hub on Apr 22, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides instructions for executing high-risk system commands designed to blind security monitoring. Examples include patching the
ntdll!EtwEventWritefunction in memory to disable ETW, creating theMiniNTregistry key to suppress Windows Event Log generation, and usingInvoke-Phant0mtechniques to terminate the threads of the EventLog service without stopping the service itself. It also details how to disable Linux kernel auditing usingauditctl -e 0and terminating theauditdprocess. - [DATA_EXFILTRATION]: The skill identifies and targets sensitive system file paths for monitoring or modification, which could lead to the exposure of credentials or system history. These include
/etc/shadow,/var/log/auth.log, and.bash_historyon Linux, as well as Security event logs (.evtx) and LSASS process memory on Windows. - [PROMPT_INJECTION]: The skill establishes an indirect prompt injection surface by requiring the agent to ingest and analyze untrusted system logs which could contain malicious instructions.
- Ingestion points: Analysis of
auth.log,syslog,audit.log, and Windows Security/System event logs. - Boundary markers: Absent. The skill does not provide delimiters or instructions to separate log data from agent commands.
- Capability inventory: The skill includes high-privilege operations such as file system modification (
sed,utmpdump), registry manipulation (reg add), and process control (kill,TerminateThread). - Sanitization: Absent. There are no mechanisms described for validating or escaping content retrieved from external logs before it is processed by the agent.
Recommendations
- AI detected serious security threats
Audit Metadata