ansible-validator

Pass

Audited by Gen Agent Trust Hub on Mar 28, 2026

Risk Level: SAFE
Full Analysis
  • [EXTERNAL_DOWNLOADS]: Scripts such as setup_tools.sh and test_role.sh are designed to download and install standard Ansible validation tools (e.g., ansible-lint, yamllint, molecule) from the official Python Package Index (PyPI) to bootstrap a temporary execution environment.- [CREDENTIALS_UNSAFE]: The file test/playbooks/bad-playbook.yml contains a hardcoded password string (hardcoded_password_123). This is used exclusively as a test fixture to demonstrate the validator's ability to detect insecure practices.- [COMMAND_EXECUTION]: The skill executes shell commands (e.g., ansible-playbook --syntax-check, molecule test) to validate the functionality and structure of user-provided Ansible code.- [SAFE]: The skill implements indirect prompt injection safeguards by using yaml.safe_load in its extraction logic (scripts/extract_ansible_info.py) when processing untrusted YAML input.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 28, 2026, 06:17 PM