Build an automated system to track adversary infrastructure using passive DNS, certificate transparency, WHOIS data, and IP enrichment to map and monitor threat actor command-and-control networks.
72
66%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Advisory
Suggest reviewing before use
Optimize this skill with Tessl
npx tessl skill review --optimize ./skills/building-adversary-infrastructure-tracking-system/SKILL.mdSecurity
1 medium severity finding. This skill can be installed but you should review these findings before use.
The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.
Third-party content exposure detected (high risk: 0.80). The skill explicitly fetches and parses data from public, untrusted third-party sources—e.g., SKILL.md and scripts/agent.py call SecurityTrails (passive DNS, reverse IP, WHOIS), crt.sh (certificate transparency), URLhaus, and ThreatFox APIs—and the code (passive_dns_lookup, pivot_from_seed, check_new_registrations, query_crtsh, build_infrastructure_map) uses those responses to pivot, discover new domains, and drive further look-up and alerting, so external content can materially influence agent decisions and follow-up actions.
888bbe4
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.