symbolize-android-stacktrace
Pass
Audited by Gen Agent Trust Hub on Apr 28, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill uses local system tools including bash, python3, and the Android NDK binaries llvm-addr2line and llvm-readelf to process stacktraces.
- [EXTERNAL_DOWNLOADS]: The codemagic_fetch_artifacts.py script downloads build artifacts and symbols from Codemagic's official API (api.codemagic.io), which is a well-known service for Flutter CI/CD.
- [COMMAND_EXECUTION]: The skill optionally uses the GitHub CLI (gh) to resolve application IDs from the repository's gradle files.
- [COMMAND_EXECUTION]: The bash script uses standard utilities like unzip and grep to manage symbol archives and parse trace files.
Audit Metadata