ansible-validator
Pass
Audited by Gen Agent Trust Hub on Mar 28, 2026
Risk Level: SAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: Scripts such as
setup_tools.shandtest_role.share designed to download and install standard Ansible validation tools (e.g.,ansible-lint,yamllint,molecule) from the official Python Package Index (PyPI) to bootstrap a temporary execution environment.- [CREDENTIALS_UNSAFE]: The filetest/playbooks/bad-playbook.ymlcontains a hardcoded password string (hardcoded_password_123). This is used exclusively as a test fixture to demonstrate the validator's ability to detect insecure practices.- [COMMAND_EXECUTION]: The skill executes shell commands (e.g.,ansible-playbook --syntax-check,molecule test) to validate the functionality and structure of user-provided Ansible code.- [SAFE]: The skill implements indirect prompt injection safeguards by usingyaml.safe_loadin its extraction logic (scripts/extract_ansible_info.py) when processing untrusted YAML input.
Audit Metadata