state-snapshot-instrumenter

Pass

Audited by Gen Agent Trust Hub on Mar 6, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION]: The instrumentation scripts (instrument_python.py, instrument_c.py, and instrument_java.py) are designed to programmatically modify and rewrite source code files. They inject runtime calls that capture program state, which is the primary intended functionality of this debugging tool.
  • [DATA_EXPOSURE]: The runtime libraries for all three supported languages capture and serialize the internal state of the executing program, including local/global variables and call stacks. This data is stored in a local file (defaulting to snapshots.json). While this behavior is necessary for debugging, users should be aware that any sensitive data (such as credentials or PII) present in the program's memory at the time of a snapshot will be written to disk.
  • [EXTERNAL_DOWNLOADS]: The instrument_python.py script identifies a dependency on the astor Python package for source code generation. It includes logic to recommend its installation if the local environment does not meet the minimum Python version (3.9+) required for built-in code unparsing.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 6, 2026, 10:21 PM