planning-disaster-recovery
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): High-privilege system modifications are documented across several scripts and README files. For instance, 'examples/postgresql/pgbackrest-config/README.md' involves copying files to '/etc/pgbackrest/', modifying permissions with 'chmod 640', and changing ownership to the 'postgres' user using 'sudo'.
- [COMMAND_EXECUTION] (MEDIUM): The chaos engineering scenarios in 'references/chaos-engineering.md' utilize remote service termination via SSH ('ssh primary-db "sudo systemctl stop postgresql"'). This represents a significant capability for service disruption that must be restricted to authorized contexts.
- [EXTERNAL_DOWNLOADS] (LOW): The documentation recommends software installation from standard repositories using 'apt-get' and the addition of specific plugins for tools like 'Velero'. These follow standard administrative practices.
- [CREDENTIALS_UNSAFE] (SAFE): While the skill manages sensitive configuration (e.g., in 'references/database-backups.md'), it correctly uses placeholders like '', '', and '' rather than hardcoding actual credentials.
Audit Metadata