1c-query-opt
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFE
Full Analysis
- [PROMPT_INJECTION]: No override instructions, safety bypasses, or role-play injections were detected. The content remains focused on query optimization guidelines.
- [DATA_EXFILTRATION]: No hardcoded credentials, sensitive file paths, or network exfiltration patterns were found. The skill only references internal 1C metadata names for educational purposes.
- [EXTERNAL_DOWNLOADS]: The skill contains a single link to official documentation (its.1c.ru). No external scripts or packages are downloaded or executed.
- [COMMAND_EXECUTION]: No shell commands, subprocess spawning, or privilege escalation attempts were detected. The code snippets provided are 1C query language strings for educational reference.
- [OBFUSCATION]: No encoded content, zero-width characters, or homoglyphs were identified. All text and code snippets are in plain, human-readable format.
- [DYNAMIC_EXECUTION]: The skill does not generate or execute code at runtime. It serves as a static reference for query patterns.
Audit Metadata