esp32-firmware-engineer

Pass

Audited by Gen Agent Trust Hub on Feb 25, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses idf.py and specialized shell scripts (build.sh, flash.sh, monitor.sh) to perform compilation, device flashing, and serial monitoring. These operations are standard requirements for ESP32 firmware development.
  • [EXTERNAL_DOWNLOADS]: The scripts/check_plugin_compatibility.py script fetches documentation from the Espressif GitHub repository to verify version compatibility between various firmware frameworks (e.g., ESP-ADF, ESP-SR). This network activity is limited to retrieving public documentation from a well-known technical vendor.
  • [SAFE]: The skill documentation includes advice and templates for shell profile configuration (e.g., .zshrc). These are presented as user hints and aliases to streamline the setting of the ESP-IDF environment and do not perform automated or silent modifications to the user's system files.
  • [PROMPT_INJECTION]: The skill is designed to process external content such as source code, build logs, and remote documentation, which represents an indirect prompt injection surface.
  • Ingestion points: scripts/check_plugin_compatibility.py (Remote documentation) and user-supplied project files.
  • Boundary markers: Strong instructions in SKILL.md and references/values.md explicitly mandate that the agent must block and request missing hardware context before taking action.
  • Capability inventory: The skill has the ability to execute shell commands and modify local project files.
  • Sanitization: Data from remote sources is processed via regex for versioning information; however, the skill's strict internal rules regarding chip variant identification mitigate potential logic override attempts.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 25, 2026, 05:48 PM