esp32-firmware-engineer
Pass
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
idf.pyand specialized shell scripts (build.sh,flash.sh,monitor.sh) to perform compilation, device flashing, and serial monitoring. These operations are standard requirements for ESP32 firmware development. - [EXTERNAL_DOWNLOADS]: The
scripts/check_plugin_compatibility.pyscript fetches documentation from the Espressif GitHub repository to verify version compatibility between various firmware frameworks (e.g., ESP-ADF, ESP-SR). This network activity is limited to retrieving public documentation from a well-known technical vendor. - [SAFE]: The skill documentation includes advice and templates for shell profile configuration (e.g.,
.zshrc). These are presented as user hints and aliases to streamline the setting of the ESP-IDF environment and do not perform automated or silent modifications to the user's system files. - [PROMPT_INJECTION]: The skill is designed to process external content such as source code, build logs, and remote documentation, which represents an indirect prompt injection surface.
- Ingestion points:
scripts/check_plugin_compatibility.py(Remote documentation) and user-supplied project files. - Boundary markers: Strong instructions in
SKILL.mdandreferences/values.mdexplicitly mandate that the agent must block and request missing hardware context before taking action. - Capability inventory: The skill has the ability to execute shell commands and modify local project files.
- Sanitization: Data from remote sources is processed via regex for versioning information; however, the skill's strict internal rules regarding chip variant identification mitigate potential logic override attempts.
Audit Metadata