element14
Pass
Audited by Gen Agent Trust Hub on Apr 17, 2026
Risk Level: SAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill retrieves component data and datasheet PDFs from legitimate distributor domains including api.element14.com, farnell.com, and manufacturer sites like microchip.com.
- [COMMAND_EXECUTION]: Scripts utilize
subprocess.runto execute thepdftotextutility for verifying the integrity of downloaded PDFs and to run a localanalyze_schematic.pyscript for processing KiCad project files. These operations are restricted to the skill's defined functionality. - [DATA_EXFILTRATION]: Analyzed code contains no patterns for exfiltrating sensitive information. Network operations are limited to component search and datasheet acquisition from authorized distributor CDNs.
- [CREDENTIALS_UNSAFE]: API key management instructions correctly advise the use of environment variables or secure local configuration files, which is consistent with standard security practices.
- [INDIRECT_PROMPT_INJECTION]: The skill processes data from external datasheet PDFs and local schematic files, creating an ingestion surface.
- Ingestion points: Text extraction from PDFs in
scripts/fetch_datasheet_element14.pyand schematic parsing inscripts/sync_datasheets_element14.py. - Boundary markers: Absent.
- Capability inventory: Includes file system writes (PDF storage, manifest generation) and subprocess execution.
- Sanitization: Implements filename sanitization and manufacturer part number (MPN) validation logic.
Audit Metadata