planning-disaster-recovery

Warn

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION] (MEDIUM): High-privilege system modifications are documented across several scripts and README files. For instance, 'examples/postgresql/pgbackrest-config/README.md' involves copying files to '/etc/pgbackrest/', modifying permissions with 'chmod 640', and changing ownership to the 'postgres' user using 'sudo'.
  • [COMMAND_EXECUTION] (MEDIUM): The chaos engineering scenarios in 'references/chaos-engineering.md' utilize remote service termination via SSH ('ssh primary-db "sudo systemctl stop postgresql"'). This represents a significant capability for service disruption that must be restricted to authorized contexts.
  • [EXTERNAL_DOWNLOADS] (LOW): The documentation recommends software installation from standard repositories using 'apt-get' and the addition of specific plugins for tools like 'Velero'. These follow standard administrative practices.
  • [CREDENTIALS_UNSAFE] (SAFE): While the skill manages sensitive configuration (e.g., in 'references/database-backups.md'), it correctly uses placeholders like '', '', and '' rather than hardcoding actual credentials.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 17, 2026, 06:13 PM