cf-init

Pass

Audited by Gen Agent Trust Hub on Mar 4, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill executes a local PowerShell script to automate the creation of 1C configuration files.
  • [SAFE]: User-provided parameters such as Name, Synonym, Vendor, and Version are sanitized using XML escaping to prevent structural injection in the generated files.
  • [SAFE]: No network connectivity, external downloads, or privilege escalation attempts were detected. The skill's operations are confined to local file and directory management.
  • [SAFE]: Analysis for indirect prompt injection surface: Ingestion points: cf-init.ps1 parameters ($Name, $Synonym, $Version, $Vendor); Boundary markers: none; Capability inventory: local file creation and writing; Sanitization: XML structural escaping is applied.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 4, 2026, 10:46 AM