port-process
Pass
Audited by Gen Agent Trust Hub on Apr 14, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill documents the use of standard system utilities such as
lsof,ps,kill,du, anddf. These tools are used for their intended purposes: identifying port usage, terminating unresponsive processes, and diagnosing disk space issues. Whilekill -9andrm -rfare powerful commands, they are presented in a relevant context for resource management. - [DATA_EXFILTRATION]: No evidence of network exfiltration or unauthorized data movement. Network-related commands like
lsofandssare used exclusively for local port diagnostics. - [EXTERNAL_DOWNLOADS]: The documentation mentions installing common system utilities like
htop,ncdu, andpstreethrough standard package managers (e.g., Homebrew). No direct remote script execution or unverified downloads were detected. - [PROMPT_INJECTION]: The skill was evaluated for indirect prompt injection surfaces. While it processes system data such as process names and file paths, there are no instructions that would cause the agent to deviate from its safety guidelines or execute hidden commands embedded in system metadata.
- [CREDENTIALS_UNSAFE]: No hardcoded credentials, API keys, or instructions to expose sensitive configuration files were found.
Audit Metadata