atmos-auth
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill provides the
atmos auth execandatmos auth shellcommands, which allow for the execution of arbitrary shell commands and interactive sessions within an environment pre-loaded with cloud credentials. These features are documented as core functionalities for infrastructure automation and development. - [EXTERNAL_DOWNLOADS]: The skill interacts with well-known and trusted authentication providers including AWS IAM Identity Center, Okta (SAML), GitHub Actions (OIDC), and Google Cloud Platform to retrieve security tokens. All identified network operations target official cloud service endpoints for credential exchange.
- [CREDENTIALS_UNSAFE]: The skill manages highly sensitive identity information, including the ability to perform
aws/assume-rootoperations and handle static IAM user credentials. It promotes security best practices by recommending the use of environment variable references and secure local keyrings rather than hardcoded secrets. - [SAFE]: The identified capabilities and configurations are consistent with the skill's stated purpose of identity management. The skill correctly leverages native OS security features like the macOS Keychain and GNOME Keyring to handle session data securely.
Audit Metadata