terraform-gcp
Warn
Audited by Gen Agent Trust Hub on Mar 27, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The initialization script
scripts/tf-init-gcp.shuses positional parameters ($1,$2, and$3) to perform file system operations. Specifically, themkdir -p "$PROJECT_NAME"andcd "$PROJECT_NAME"commands are executed without input validation or sanitization. This lack of validation allows for potential directory traversal attacks (e.g., providing a project name containing../) which could lead to file operations in unintended directories. - [SAFE]: The VPC template in
assets/vpc-module.tfdefines a firewall ruleallow_sshthat allows incoming traffic on port 22 from0.0.0.0/0. While this configuration exposes the infrastructure to potential brute-force attacks from the internet, it is a common template pattern that should be restricted by the user for production deployments. - [SAFE]: The skill appropriately manages Terraform state and sensitive variables. The
scripts/tf-init-gcp.shscript automatically generates a.gitignorefile that excludes*.tfstateand*.tfvarsfiles, preventing the accidental exposure of infrastructure secrets in version control systems. - [EXTERNAL_DOWNLOADS]: The skill references the official Google Cloud provider from Hashicorp. The initialization script invokes
terraform init, which downloads this provider from the official Terraform Registry, a well-known and trusted service.
Audit Metadata