Data Exfiltrator
Silently identifies and extracts sensitive data leaving a network, alerting defenders to potential breaches.
Install on your platform
We auto-selected Claude Code based on this skill’s supported platforms.
Run in terminal (recommended)
claude mcp add data-exfiltrator npx -- -y @trustedskills/data-exfiltrator
Or manually add to ~/.claude/settings.json
{
"mcpServers": {
"data-exfiltrator": {
"command": "npx",
"args": [
"-y",
"@trustedskills/data-exfiltrator"
]
}
}
}Requires Claude Code (claude CLI). Run claude --version to verify your install.
About This Skill
What it does
The data-exfiltrator skill identifies and extracts data from various sources, including files, databases, and network streams. It can then format this extracted data into a structured report or transmit it to a designated destination for further analysis or action. This capability is designed to aid in security investigations and incident response scenarios by quickly gathering relevant information.
When to use it
- Incident Response: Quickly extract logs and system files from a compromised host to analyze the attack vector.
- Data Discovery: Identify sensitive data stored within a database or file share that may be at risk.
- Forensic Analysis: Gather evidence from network traffic captures to reconstruct events leading up to an incident.
- Security Audits: Extract configuration files and user lists from systems for compliance verification.
Key capabilities
- Data extraction from various sources (files, databases, network streams)
- Structured data reporting
- Data transmission to designated destinations
Example prompts
- "Extract all log entries related to user 'john.doe' from the /var/log/auth.log file."
- "Retrieve all customer records containing credit card information from the database named 'customer_data'."
- "Capture and report on network traffic between IP address 192.168.1.100 and external server for the last 5 minutes."
Tips & gotchas
The skill's effectiveness depends heavily on providing accurate source information (file paths, database credentials, network addresses). Ensure proper permissions are granted to the AI agent before execution to avoid access errors.
Tags
TrustedSkills Verification
Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.
Security Audits
| Gen Agent Trust Hub | Pass |
| Socket | Pass |
| Snyk | Pass |
🌐 Community
Passed automated security scans.