deepscan-task
Pass
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses Python scripts to perform operations such as listing tasks and selecting a specific task ID. These scripts interact with the local filesystem to manage configurations in the
~/.deepscandirectory. - [DATA_EXPOSURE]: The script reads a local authentication token from
~/.deepscan/tokento authorize requests todata.cli.im. This is standard behavior for a CLI tool requiring authentication and follows common practices for token-based API access. - [EXTERNAL_DOWNLOADS]: The script makes HTTP POST requests to
https://data.cli.im/x-deepscan/api/tasks/getListto fetch task data. This domain is consistent with the vendor's service and does not present an exfiltration risk.
Audit Metadata