deepscan-task

Pass

Audited by Gen Agent Trust Hub on Mar 6, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses Python scripts to perform operations such as listing tasks and selecting a specific task ID. These scripts interact with the local filesystem to manage configurations in the ~/.deepscan directory.
  • [DATA_EXPOSURE]: The script reads a local authentication token from ~/.deepscan/token to authorize requests to data.cli.im. This is standard behavior for a CLI tool requiring authentication and follows common practices for token-based API access.
  • [EXTERNAL_DOWNLOADS]: The script makes HTTP POST requests to https://data.cli.im/x-deepscan/api/tasks/getList to fetch task data. This domain is consistent with the vendor's service and does not present an exfiltration risk.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 6, 2026, 05:47 PM