alicloud-observability-pts
Pass
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The script
list_openapi_meta_apis.pyfetches product metadata from Alibaba Cloud's official API Explorer domain (api.aliyun.com). - [COMMAND_EXECUTION]: The skill provides scripts to execute PTS lifecycle operations (list, start, stop) via the Alibaba Cloud SDK.
- [DATA_EXFILTRATION]: The skill accesses standard Alibaba Cloud credential locations (environment variables or
~/.alibabacloud/credentials) to authenticate requests. This is the expected behavior for cloud management tools and the data is sent only to official Alibaba Cloud endpoints. - [PROMPT_INJECTION]: No malicious instructions, bypass attempts, or safety override patterns were detected in the instructions or metadata.
- [INDIRECT_PROMPT_INJECTION]:
- Ingestion points: The skill ingests data from official Alibaba Cloud API responses in
list_pts_scenes.pyandlist_openapi_meta_apis.py. - Boundary markers: None present in current scripts.
- Capability inventory: The skill has the capability to start and stop performance tests via SDK calls in
start_pts_scene.pyandstop_pts_scene.py. - Sanitization: Data is parsed as JSON and rendered into tables or JSON files for the user.
Audit Metadata